The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Kaspersky’s support website hacked!

Hard to digest, but true. The leading anti-virus website provider Kaspersky’s support website got hacked and details are published at this blog. Kasperksy admitted that it’s their fault and blamed

XP Registry tricks II

Easy Text Size Change in Help & IE Tip:I mentioned a way that you can change the size of the text that is display in the Help file and in

Local File Inclusion (LFI) tutorial

This tutorial will guide you into the process of exploiting a website through the LFI (Local File Inclusion). First lets take a look at a php code that is vulnerable