The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Detecting New Rootkits

A new rootkit can either be one that has never been seen before, or one that uses new technologies or previously unused methods of attack. Or both. Andthat is where

Critical xss vulnerabilities at classified listings site Ads.com.mm

PlanetCreator has reported another critical XSS Vulnerability on classified listings site Ads.com.mm Cross Site Scripting is a client-side attack where an attacker can craft a malicious link, containing script- code

DoS vulnerabilities

Denial Of Service Overview DoS or Denial Of Service vulnerabilities will occur if there is some type of bottleneck within the software application. This could cause excessive cpu usage, memory