SSH2 Protocol | eHow.com: " the connection layer and the SSH Fingerprint. Each layer is extensible. SSH2 uses a public key encryption system. Other security systems can be integrated into SSH2. Kerberos is frequently used for SSH2 security.
Operations
An SSH2 connection can carry several sessions between the same client and server. This enables it to be used for tunneling (carrying d"
'via Blog this'
No comments:
Post a Comment