#ssh

[ follow ]
#remote-access
fromZDNET
8 months ago
DevOps

The best SSH clients for MacOS

SSH is pre-installed on MacOS, and users can opt for third-party GUI applications for a better experience.
fromZDNET
8 months ago
DevOps

The best SSH clients for Linux (and why you need them)

SSH is crucial for secure remote access in Linux environments, especially without GUIs.
Users can enhance SSH usage with command line configurations and GUI tools like Remmina.
fromZDNET
7 months ago
DevOps

The best SSH clients for Android - including my two favorites

Android devices can effectively connect to Linux machines via SSH using specialized apps available in the Google Play Store.
fromZDNET
2 days ago
Remote teams

My favorite SSH clients for Android - and why you need them

You can connect to Linux machines via SSH using Android apps like JuiceSSH and Termius.
fromZDNET
8 months ago
DevOps

The best SSH clients for MacOS

SSH is pre-installed on MacOS, and users can opt for third-party GUI applications for a better experience.
fromZDNET
8 months ago
DevOps

The best SSH clients for Linux (and why you need them)

SSH is crucial for secure remote access in Linux environments, especially without GUIs.
Users can enhance SSH usage with command line configurations and GUI tools like Remmina.
fromZDNET
7 months ago
DevOps

The best SSH clients for Android - including my two favorites

Android devices can effectively connect to Linux machines via SSH using specialized apps available in the Google Play Store.
fromZDNET
2 days ago
Remote teams

My favorite SSH clients for Android - and why you need them

You can connect to Linux machines via SSH using Android apps like JuiceSSH and Termius.
more#remote-access
Information security
fromSecuritymagazine
1 week ago

Devices exposed to remote hacking via Erlang/OTP SSH vulnerability

Erlang/OTP's SSH implementation has a critical vulnerability allowing remote code execution without authentication, requiring urgent attention and action from security teams.
fromZDNET
2 weeks ago
Gadgets

5 things to do with the Linux terminal on your Android phone - including my favorite

The Linux terminal on Android 15 allows users to access familiar Linux commands, enhancing mobile capabilities.
fromThe Hacker News
4 weeks ago
Cryptocurrency

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

The Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.
#security
Information security
fromTechzine Global
2 months ago

OpenSSH vulnerability enables MitM attacks

OpenSSH has two significant vulnerabilities that can lead to man-in-the-middle attacks and denial of service.
Users should disable VerifyHostKeyDNS if enabled and upgrade OpenSSH as soon as patches are available.
fromInfoQ
5 months ago
Information security

Cloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH Credentials

Cloudflare's Access for Infrastructure SSH enhances security by replacing traditional SSH keys with short-lived, ephemeral certificates.
Information security
fromTechzine Global
2 months ago

OpenSSH vulnerability enables MitM attacks

OpenSSH has two significant vulnerabilities that can lead to man-in-the-middle attacks and denial of service.
Users should disable VerifyHostKeyDNS if enabled and upgrade OpenSSH as soon as patches are available.
fromInfoQ
5 months ago
Information security

Cloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH Credentials

Cloudflare's Access for Infrastructure SSH enhances security by replacing traditional SSH keys with short-lived, ephemeral certificates.
more#security
fromMouse Vs Python
6 months ago
JavaScript

SSH Scripting with Fabric and Python - Mouse Vs Python

Fabric simplifies remote command execution over SSH in Python applications.
[ Load more ]