The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

What are the advantages and disadvantages of honey pots?

Honey pots have several advantages, which are as follows: * Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real

FEMA Phones Get Hacked

If you are going to hack a phone system, do you really want to hack the Department of Homeland Security? That’s what happened this weekend when someone made hundreds of

Infection via HTML

Edit the code on what and how you need it, and yes this is detectable  in many cases, but you could insert a small FUD downloader to be  downloaded via