The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Email Servers and Ports

Email Servers and PortsThere are two servers required for sending and receiving email, i.e. the SMTP and POP servers. ## Incoming and Outgoing Mail Servers # Incoming Mail Server# :

Whats is NetBIOS?

NetBIOS (Network Basic Input/Output System) was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. Since its creation, NetBIOS has

Critical XSS Vulnerability in U Lun Gywe’s Website

PlanetCreator has reported another critical Persistent XSS Vulnerability on U Lun Gywe :    Myanmar most famous impressionist artist http://www.ulungywe.com/ powered by IndexMyanmar This vulnerability has been alerted to :- webmaster