Sponsored Content
Full Discussion: Basic information please.
Special Forums UNIX Desktop Questions & Answers Basic information please. Post 26467 by auswipe on Monday 19th of August 2002 10:57:26 AM
Old 08-19-2002
For Win32 access to your Unix box running SSH you can use PuTTY. It is a free SSH client that I have used for years. PuTTY also supports SSH tunneling which is real handy.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Basic

hi, I am pretty new both to unix and this forum, can anyone help me to give shortcuts to my commands... eg:- instead of "cd /usr/bin" i want to to give " bin " and get to that path. I'm using HP-UX 11.0 abey (2 Replies)
Discussion started by: abey
2 Replies

2. What is on Your Mind?

Basic...

hi, I am pretty new both to unix and this forum, can anyone help me to give shortcuts to my commands... eg:- instead of "cd /usr/bin" i want to to give " bin " and get to that path. I'm using HP-UX 11.0 abey (2 Replies)
Discussion started by: abey
2 Replies

3. HP-UX

Bt-basic

Hi Guys, I very new to bt-basic even I got 8 years experience on UNIX. I searched through google about bt-basic but nothing really give me solid documentation. Anybody have documentation or manual for this bt-basic? Pls help me (2 Replies)
Discussion started by: shahru
2 Replies

4. UNIX for Dummies Questions & Answers

Need some basic help

Hi everyone, I need some help! I know that this is a very simple little problem but I seem to be stuck. I was just wondering if you could show me the right way. I basicly have to write a single line of commands (using piping) to do the following: From the file data.txt, select all of the... (2 Replies)
Discussion started by: itk
2 Replies

5. UNIX for Dummies Questions & Answers

basic if else

I know this is pretty basic, but i cant figure it out to save my life. i want it to ask for a variable, as long as that variable isnt -/0 i want it to print out the area. else if the variable is -/0, i want it to print out invalid entry. the only problem is it will still try to print out the... (1 Reply)
Discussion started by: cookiebooy
1 Replies

6. Solaris

Basic - how do I?

How do I use ls and grep together to count a certain number of files in a directory? -Thanks (1 Reply)
Discussion started by: secno
1 Replies

7. Android

Basic Android platform information.

I am thinking of developing an app' for Android mobile devices... Two questions here:- 1) Does anyone _develop_ for the Android _mobile_ platform? If so do you use OSX 10.7.5 or greater as your _development_platform_? 2) I know ********* is gonna say that the Android terminal/shell is... (13 Replies)
Discussion started by: wisecracker
13 Replies

8. UNIX for Dummies Questions & Answers

Basic help

Hi , I need to know the difference between $((command)) and $(command) and $(($(command))). "" and '' and ``. I have tried searching the help files but cant able to find this. Could you let me knoq about any document. Thanks (4 Replies)
Discussion started by: Raj999
4 Replies
SECSH(5)							    Lsh Manuals 							  SECSH(5)

NAME
secsh - the Secure Shell protocol DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components: The Transport layer protocol This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User authentication protocol This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server. The Connection protocol This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels. IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist. The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]). The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License. REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998 [SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998 [SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998 [SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998 [SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995 TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd. AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8) LSH
JANUARY 1999 SECSH(5)
All times are GMT -4. The time now is 02:42 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy