Networks have never been secure. As the demand on open networks for remote access has grown, the risks of compromised systems and accounts has kept pace. Tools for securing networks, such as OpenSSH, were developed to counter the threats of password . . .
Networks have never been secure. As the demand on open networks for remote access has grown, the risks of compromised systems and accounts has kept pace. Tools for securing networks, such as OpenSSH, were developed to counter the threats of password theft, session hijacking, and other network attacks. However, these tools come with the price of planning, configuration, and integration. This article provides recommendations for configuring and managing OpenSSH.

The link for this article located at Sun is no longer available.