Passwords are transferred over ssh in hashed form, not plaintext. Assuming you have a strong password, it would be very difficult to figure it out based on it's hash.
ssh
Installing SSH Secure Shell involve several steps. One can find detailed instructions on how to install SSH Secure Shell at websites such as Information Systems Services.
SSH stands for Secure Shell. (Often shown as Secure SHell.) It is a secure method for a host computer to connect to a remote computer on the network or over the internet.
There is no particular program meant to replace SSH. SSH is considered a modern and secure program, so there is no reason to replace it.
SSH is more secure than Telnet.
I think you can do nfs over ssh somehow.
To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.
SSH Stands for Secure Shell and always run port number 22
Use of SSH or VTY ACLs.
rsh and ssh are similar in that they can execute commands on remote systems. The main difference between the two (besides the actual TCP ports) is that rsh traffic is not encrypted and therefore a security risk; ssh traffic is encrypted. The other main difference is that ssh is a secure replacement for telnet, whereas rsh can log into a remote system using the rlogin protocol, which is similar but not the same as telnet.
SSH stands for secure shell. It is a more secure way to connect and perform remote functions. Telnet will allow you to connect to a router or other device and type commands. The problem is that, if intercepted, the commands can be "seen". SSH encrypts or hides the commands so they can't be "seen" if intercepted.
SSH is an extremely useful tool that allows one to do many things in a secure fashion. One can set SSH tunneling by download the Cygwin installation wizard.