answersLogoWhite

0

What makes SSH secure?

Updated: 11/5/2022
User Avatar

Wiki User

15y ago

Best Answer

Passwords are transferred over ssh in hashed form, not plaintext. Assuming you have a strong password, it would be very difficult to figure it out based on it's hash.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What makes SSH secure?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What protocol is meant to be a secure alternative to Telnet?

ssh


How can SSH Secure Shell be installed?

Installing SSH Secure Shell involve several steps. One can find detailed instructions on how to install SSH Secure Shell at websites such as Information Systems Services.


What does ssh in Linux stsnds for?

SSH stands for Secure Shell. (Often shown as Secure SHell.) It is a secure method for a host computer to connect to a remote computer on the network or over the internet.


Which program is meant to replace SSH?

There is no particular program meant to replace SSH. SSH is considered a modern and secure program, so there is no reason to replace it.


Why is it advisable that a network administrator use SSH instead of Telnet when managing?

SSH is more secure than Telnet.


How can you secure nfs?

I think you can do nfs over ssh somehow.


Which connection provides a secure CLI session with encryption to a Cisco switch?

To provide a secure CLI session with encryption to a Cisco switch an SSH or Secure Shell connection will be required as this uses a cryptographic network protocol that provides secure data communication.


What port does SSH use by default?

SSH Stands for Secure Shell and always run port number 22


What can be done to secure a telnet connections?

Use of SSH or VTY ACLs.


What is the difference between RSH and SSH?

rsh and ssh are similar in that they can execute commands on remote systems. The main difference between the two (besides the actual TCP ports) is that rsh traffic is not encrypted and therefore a security risk; ssh traffic is encrypted. The other main difference is that ssh is a secure replacement for telnet, whereas rsh can log into a remote system using the rlogin protocol, which is similar but not the same as telnet.


What is ssh protocol?

SSH stands for secure shell. It is a more secure way to connect and perform remote functions. Telnet will allow you to connect to a router or other device and type commands. The problem is that, if intercepted, the commands can be "seen". SSH encrypts or hides the commands so they can't be "seen" if intercepted.


How does one go about setting up SSH tunneling?

SSH is an extremely useful tool that allows one to do many things in a secure fashion. One can set SSH tunneling by download the Cygwin installation wizard.