• Poorly managed SSH keys pose serious risks for most companies

    Posted February 24, 2014 - 3:16 pm

    Three in four have no processes for managing keys that provide access to critical servers.
  • Tricks for making ssh/scp connections better

    Posted January 12, 2014 - 5:25 pm

    Secure connections can be even more secure or even less troublesome if you use a key pair and do it right.
  • Slideshow

    Sher-locked: 12 famous passwords used through the ages

    Posted January 8, 2014 - 3:34 pm

    Passwords seem like a recent thing, but they’ve been in use for a long time. Here are a dozen of the more memorable ones
  • Unix: Making ssh connections easier

    Posted December 27, 2013 - 6:31 pm

    Need a way to make connecting to lots of servers using different settings and usernames easier? Look no further than the ssh config file.
  • How to prevent SSH from timing out

    Posted December 24, 2013 - 9:00 am

    If you spend a lot of time at the command line you may have run into an annoying issue where your session times out after a relatively brief period of inactivity. While this is desirable from a security perspective, it can cause problems when you’re trying to perform a long running operation. Here’s how to temporarily prevent SSH from timing out.
  • Father of SSH working on new version of crypto standard

    Posted April 10, 2013 - 9:35 am

    The Secure Shell (SSH) cryptographic network protocol that's supported in software for server authentication and machine-to-machine communications is headed for a significant update.
  • SSH key mismanagement and how to solve it

    Posted March 4, 2013 - 1:31 pm

    Most organizations do not have control over how their SSH keys are created or managed, leaving them vulnerable to attack and at risk of costly fines for regulatory noncompliance.
  • Tatu Ylonen, father of SSH, says security is 'getting worse'

    Posted July 25, 2012 - 11:11 am

    Tatu Ylonen has garnered fame in technology circles as the inventor of Secure Shell (SSH), the widely used protocol to protect data communications. The CEO of SSH Communications Security -- whose crypto-based technology invented in 1995 continues to be used in hundreds of millions of computers, routers and servers -- recently spoke with Network World on a variety of security topics. (At the Black Hat Conference this week, his company is also announcing CryptoAuditor.)
  • 16 ultimate SSH hacks

    Posted March 23, 2012 - 11:32 am

    So you think you know OpenSSH inside and out? Test your chops against this hit parade of 16 expert tips and tricks.
  • Port forwarding

    Posted August 26, 2008 - 1:43 pm

    Port forwarding can get you around some sticky network restrictions and is easy to set up with ssh. Let's look at what it is and how it works with a simple example that you can try on your own systems.

Join today!

See more content
Ask a Question