The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Joomla Hack

######################################################################################### Joomla 1.5.x Remote Admin Password Change ########################################################################################## ## Author: d3m0n ([email protected]) ## Greets: GregStar, gorion, d3d!k ## ## Polish “hackers” used this bug to deface turkish sites BUAHAHHA nice

Critical SQL Injection (http://www.mysuboo.com)

Today we shall consider the SQL Injection error on the site http://www.mysuboo.com/. Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Security_T00L System Time: ———— (UTC+08:00) Kuala Lumpur, Singapore, 03/23/2010 01:01:56 AM Site : http://www.mysuboo.com/ SQL Version

Security Weakness of Emerge (Malaysia Web Hosting)

No man is infallible, Nobody safes @ online and There’s no complete secure protection in this Cyberwar! During these days I’m really busy with my own business! In my dream