Using the Secure Shell Protocol (SSH)
The Secure Shell Protocol allows a user to connect to a remote server or machine from another machine or personal computer via an encrypted connection. Using ssh, the Penn State Access Account userid and password pair are transmitted via an encrypted connection to prevent network snooping (or "sniffing") of passwords via traditional, non-secure network connections. Once a login session has been established, the network packets between the local PC or UNIX workstation and the remote workstation or server are also encrypted.
Why use the Secure Shell Protocol?
The secure shell protocol prevents network eavesdropping by unscrupulous individuals in search of userids and passwords to gain unauthorized access to systems. Because telnet, rlogin, and ftp present passwords "in the clear" over a non-secure network, they are vulnerable to this form of eavesdropping. The secure shell protocol encrypts (via public key encryption) userid and password interchange between two machines and then encrypts (via faster, symmetric encryption algorithms) the network traffic between the two machines. Both the password exchange and the data passing between the two machines is encrypted with strong encryption.
If you need assistance with SSH for UNIX,
then please send an e-mail request to email@example.com.