Original article:Http://www.cnblogs.com/alaska1131/articles/1659654.html
SSHThis is short for Secure Shell, developed by the Network Working Group of IETF.Application LayerAndTransport LayerBased on the security protocol.
Traditional Network ServicesProgram, SuchFTP, Pop andTelnetThey are inherently insecure because they transmit data, user accounts, and user passwords in plain text on the network, and are vulnerableIntermediary(Man-in-the-middle) attacks. There is another person or a machine impersonating a Real Server to receive data from the user to the server, and then impersonating the user to pass the data to the Real Server.
SSH is a reliable protocol designed for remote logon sessions and other network services. The SSH protocol can effectively prevent information leakage during Remote Management. BySSHIt can encrypt all transmitted data and prevent DNS Spoofing and IP spoofing.
System and version:CentosVPC: release 5.3 (final)
Install SSH
Yum Install SSH
Start SSH
Service sshd start
Set startup
Chkconfig sshd on
SSHThis is short for Secure Shell, developed by the Network Working Group of IETF.Application LayerAndTransport LayerBased on the security protocol.
Traditional network service programs, suchFTP, Pop andTelnetThey are inherently insecure because they transmit data, user accounts, and user passwords in plain text on the network, and are vulnerableIntermediary(Man-in-the-middle) attacks. There is another person or a machine impersonating a Real Server to receive data from the user to the server, and then impersonating the user to pass the data to the Real Server.
SSH is a reliable protocol designed for remote logon sessions and other network services. The SSH protocol can effectively prevent information leakage during Remote Management. BySSHIt can encrypt all transmitted data and prevent DNS Spoofing and IP spoofing.
System and version:CentosVPC: release 5.3 (final)
Install SSH
Yum Install SSH
Start SSH
Service sshd start
Set startup
Chkconfig sshd on