Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH, The Secure Shell: The Definitive Guide, Second Edition, covers the Secure Shell in detail for both system administrators and end users. This new edition adds over 100 new features and options from the latest versions of OpenSSH and SSH Tectia (formerly known as SSH2 from ssh.com). It focuses on the SSH-2 protocol, its internals, and its most popular implementations, including thorough coverage of:OpenSSH and SSH Tectia for Unix, Linux, Mac OS X, and Windows: the basics, the internals, and complex applications Configuring SSH servers and clients, both systemwide and per user, with recommended settings to maximize security Key management using agents, agent forwarding, and forced commands Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT) Integrating SSH with Kerberos, OpenPGP, PAM, and other security-related software Scalable authentication techniques for large installations, including X.509 certificates Installing and maintaining SSH systems Troubleshooting a variety of common and not-so-common problemsWhether you're communicating on a small LAN or across the Internet, SSH can ship your data from 'here' to 'there' efficiently and securely. The number of computer intrusions on the Internet continues to rise. Now, more than ever, you need to practice safe computing using SSH. This
Daniel J. Barrett, Ph.D., has been teaching and writing about Linux, the internet, and related technologies for more than 30 years. Dan has also been a software engineer, heavy metal singer, system administrator, university lecturer, birthday party magician, and humorist.
Even though this book was fun to read and contains some interesting ssh trivia. It is starting to show its age in a quite severe way. But if you read around the outdated things, there are quite some good bits in there which are explained quite well.