The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

How to prevent SQL Injection

SQL Injection: What It Is There was once a famous doctor that had it completely right: never trust your patients. Now this doctor may have only been a sitcom doctor

US Army banned the use of USB drives from its computers

They say they are the most powerful; they have their units in many countries; they attack anywhere on the globe; they have hundreds of spies and spy satellites all around

Bruter version 1.0

Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety