Paperback: 670 pages
Publisher: O'Reilly Media; 2 edition (May 20, 2005)
Product Dimensions: 7 x 1.5 x 9.2 inches
Shipping Weight: 2.8 pounds (View shipping rates and policies)
Average Customer Review: 4.1 out of 5 stars See all reviews (40 customer reviews)
Best Sellers Rank: #71,919 in Books (See Top 100 in Books) #4 in Books > Computers & Technology > Operating Systems > Unix > Shell #10 in Books > Computers & Technology > Networking & Cloud Computing > Intranets & Extranets #60 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
There is a good reason why people write superficial messages on post cards: post cards afford no confidentiality and there is no expectation of privacy. The Internet can be compared to a post card; it is one large system where data is freely interchanged. While common sense tells us that post cards are open to the public, there is a misperception among non-technical Internet users that Internet data is kept private. However, nothing could be further from the truth; on the Wild West net,all data is inherently open and unregulated.There are solutions to this predicament. One solution is called SSH (Secure Shell). SSH provides a way to take that "postcard" and have it securely delivered by a courier.In a nutshell, the book SSH, the Secure Shell: The Definitive Guide expands on two basic ideas: - Privacy is a basic human right, but on today's computer networks, privacy isn't guaranteed. - SSH is a simple idea, but it has many complex parts.But the truth is that the need for privacy and security on today's networks is far too important to be encapsulated in two bullets. This book is so loaded with valuable and important information that anyone using or administering SSH should read it thoroughly.As an introduction, SSH is a protocol that enables secure communications between computer systems that are communicating over insecure channels. SSH is more than simply a point-to-point encryption process such as a VPN. SSH allows users to authenticate themselves to remote hosts. After authentication, users can securely execute commands on a remote machine. SSH fills in for the security deficiencies that are inherent in applications such as telnet, ftp, rlogin, rsh, and rcp.
SSH has quickly become the tool of choice for remotely administering a Unix (or for that matter) Linux computer, replacing telnet, rsh and ftp. This is for good reason, these tools can easily become security holes and it is much easier to keep one tool well maintinaed and secure than a number.SSH gives improved security, both at login and of the data transmitted between computers. SSH offers both security and privacy, rare things online today. It allows secure communications between computers. SSH allows users to authenticate themselves to remote hosts. After authentication, users can securely execute commands on a remote machine. SSH fills in for the security deficiencies that are inherent in earlier methods.SSH was developed in response to the vulnerability to attack in earlier remote login and control methods. Some of these vulnerabilities include password and protocol sniffing, spoofing, eavesdropping and connection hijacking. Simply, it is the protocol of choice for secure communications between two computers across internet connections.Administering and running SSH can be a pain. As the book points out it is a simple concept with complex parts. It took me a good three or four hours for my first connection to a remote computer and another two to get SSH logins working on my computer. This book was an excellent assist throughout.It covers the three varieties of SSH (SSH 1, SSH2 and Open SSH), giving the differences and benefits of the versions. The book also shows how SSH can be used to secure other protocols, such as POP, SMTP, IMAP, and others.It also gives detailed explanations of what SSH secures against and, perhaps more importantly, what it doesn't secure against.
SSH, The Secure Shell: The Definitive Guide HTML & XHTML: The Definitive Guide: The Definitive Guide (Definitive Guides) Shell Programming in Unix, Linux and OS X: The Fourth Edition of Unix Shell Programming (4th Edition) (Developer's Library) Learning the bash Shell: Unix Shell Programming (In a Nutshell (O'Reilly)) Portable Shell Programming: An Extensive Collection of Bourne Shell Examples Mastering Unix Shell Scripting: Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus UNIX Shell Scripting Interview Questions, Answers, and Explanations: UNIX Shell Certification Review AWS Scripted 2: Essential Security, SSH and MFA 802.11 Wireless Networks: The Definitive Guide: The Definitive Guide Oracle SQL*Plus: The Definitive Guide (Definitive Guides) The Definitive Guide to GCC (Definitive Guides (Paperback)) Vertical Gardening: The Definitive Guide To Vertical Gardening For Beginners. (The Definitive Gardening Guides) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks SonicWALL Secure Wireless Network Integrated Solutions Guide How to Hide Your Guns: A Quick Guide To Keeping Your Guns Safe, Secure, And Out Of The Wrong Hands HOWTO Secure and Audit Oracle 10g and 11g Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) Hacked: The Inside Story of America's Struggle to Secure Cyberspace