VanDyke's Secure Shell white papers are for computer and software
industry professionals and managers investigating secure access
solutions with Windows workstations or servers as components.
They are also for SSH administrators who are looking to maximize
the value of secure access services to their user base.
Understanding Host Keys
Users and administrators turn to Secure Shell for many reasons. Some need to replace Telnet or FTP. Others are looking to move away from simple passwords to public-key, Kerberos, or keyboard-interactive authentication. Still others are looking for a low-cost alternative to VPNs. Whatever the reason for using Secure Shell, every user and administrator of Secure Shell needs to understand host keys. Understanding what host keys are, how they work, and the security they provide can reduce confusion and possible frustration about administering and using this authentication tool for both administrators and end users. Read more...
Secure Shell: An Overview
Secure Shell (SSH) provides an open protocol for securing network communications
which is less complex and expensive than hardware- based VPN solutions.
Secure Shell client/server solutions provide command shell, file transfer,
and data tunneling services for TCP/IP applications. SSH connections provide
highly secure authentication, encryption, and data integrity to combat
password theft and other security threats. Read more...
Secure File Transfer
Data delivery over the Internet can be simple, convenient,
and cost-effective - but it must also be secure. The Secure
Shell (SSH2) protocol provides an alternative to nonsecure
FTP. This paper explains the Secure Shell File Transfer Protocol
(SFTP) and presents specific applications for system administration,
finance, health care, and business-to-business. Read more...
Tunneling with Secure Shell
Remote access to network resources is increasingly a business
requirement, but external network threats must be neutralized.
A Secure Shell (SSH) capability called port forwarding allows
nonsecure TCP/IP data to be tunneled across public and private
networks through a secure, encrypted connection. The benefits
of port forwarding are illustrated by a series of concrete examples. Read more...