The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Credit card fraud! How to protect ourselves from this identify theft?

Credit card or the plastic money has given us lot of convenience on the good side and hell lot of head ache on the bad side. Credit card fraud as

Facebook “CSRF” attack-Full Disclosure

How a Facebook App works Anyone can create an application (or app) that will run within the Facebook platform (and many do!). An app is like a regular website with

What are the general classes of hackers?

Hackers are categorized into the following classes: * Black Hat Hackers (Crackers): These are persons who are computer specialists and use their hacking skills to carry out malicious attacks on