The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

How to Detect a Hacker Attack?

How to Detect a Hacker Attack Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same

Credit card fraud! How to protect ourselves from this identify theft?

Credit card or the plastic money has given us lot of convenience on the good side and hell lot of head ache on the bad side. Credit card fraud as

China’s ‘Green Dam-Youth Escort’ Software

Green Dam Youth Escort is the censor ware developed and distributed by Chinese government to filter ‘harmful’ content. Here are some details about the working of the software. ‘Green Dam-Youth