The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Critical XSS Vulnerability in U Lun Gywe’s Website

PlanetCreator has reported another critical Persistent XSS Vulnerability on U Lun Gywe :    Myanmar most famous impressionist artist http://www.ulungywe.com/ powered by IndexMyanmar This vulnerability has been alerted to :- webmaster

Local File Inclusion (LFI) tutorial

This tutorial will guide you into the process of exploiting a website through the LFI (Local File Inclusion). First lets take a look at a php code that is vulnerable

How and Why Hackers Want to Get Inside Your Machine

If your computer is a fortress, hackers are the interlopers with pointy metal hats who charge the gate, scale the walls, or use stolen keys to get inside. Their mission?