The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Hacking Into a Computer [With Pictures]

NetBIOS Hacking -What is it?- NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a

USB drive identifies and extracts data, leaving no footprint

Harris Corporation introduced a highly customizable USB thumb drive that quickly extracts targeted data from computers. The device – called BlackJack – is designed for military, intelligence, and law enforcement

New phishing scam targets high level executives

A new phishing attack has been circulating lately, but instead of trying to dupe millions of computer users into giving up their financial information, this one is aimed at high