The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

What’s Next for Virtualization: Optimizing the Environment

As the server virtualization market continues to mature and more companies adopt server virtualization as a standard within their environments, the concerns and questions we hear day to day about

Gmail Security Checklist, Improve Login Security

There are two to tango, and the same is true for an effective online security strategy. What does it mean? One the one side, the company offering a service needs

Visit to Myanmar —-~_~—

ShweDagon Pagoda @ Yangon, Myanmar INTO’s Education Seminar @ Trader Hotel Myanmar ICT Exhibition 2010 @ Tatmataw Hall, Yangon btw, Now I’m @ NEW WAVE Cyber Cafe, No. 12/A D1,