Search past question, project, seminar or forum topic:
Set of standards and associated network protocol that allows establishing a secure connection between a local and a remote computer, Uses public-key crypto to authenticate the remote computer and to allow the remote computer to authenticate the user Provides confidentiality and integrity of data exchanged between two computers using encryption and message authentication codes, Uses: log into a remote machine and execute commands tunnelling forwarding arbitrary TCP ports via SOCKS proxy forwarding X11 connections secure transfer of files using SFTP or SCP protocols.
Other topics you might be interested in:
Can't find what you need? Tell us: