No DDOS No Hacking No Spam No Torrent No Fraud No Repost Account
SSH (Secure Shell) is one of the remote applications developed first by Tatu Ylonen, a researcher at Helsinki University of Technology in 1995. SSH was created as a replacement for telnet, TSH and rLogin and other remote shell protocols due to remote protocols This is still not secure because there is still information, especially passwords that are still in the form of text and have not been encrypted. SSH is made to overcome this problem because in SSH all information will be encrypted, so as to protect data leakage due to an activity such as password-sniffing or the other.This protocol has advantages compared to similar protocols such as Telnet, FTP, Danrsh, because SSH has its own Authentication, Authorization, and encryption system. That way the security of a communication session through the help of SSH is more assured. SSH is safer than similar protocols, but the SSH protocol is vulnerable to certain types of attacks. In general, this attack is shown in the first version of SSH (SSH-1) which does have a weaker level of security than the second version of SSH (SSH-2).