[We need to finally settle on a logo]
... although we have done fine without one for years and years

Connection - SSH authentication options

In reverse order from the bottom up, we enable the manuall setting of the 'userid' (here, called 'username' for some reason), and navigate in the 'Browse' box to one of the two SSH-2 kets -- RSA or DSA -- that we previously generated with the 'ssh-genkey' program. Recall that on the conventional Windows setup, these keys are stored by default in the folder: Documents in a sub-folder called: ssh-keys We select the key with the .ppk ('putty private key') extension.

At connection time, because the local public key is not used, it does not need to know the name or location of it. Recall that private keys are always protected by a 'pass phrase' by careful systems administrators. While this cannot make it imposible to be compromised, use of a strong pass phrase does help rule out prying eyes that fall into possession of a image backup of your system from being able to use those private keys.

Particularly, if there is a 'keylogger' such as the FBI is alleged to have used in their investigations, or a similar facility somehow added to the backgournd programs run on your system, but reporting to a third-party, it is possible to identify unusual but repeated strings such as passwords, or pass phrases in log files. Counter-techniques include the use of 'one time passwords' ('OTP') as from a hardware device.


[  Top  |  About  |  Pricing  |  Sign Up  |  LOG ON  |  Tour  |  News  |  Support  |  Media  |  Site Map  |  EULA  |  Legal  |  DMCA  |  Contact  ]

Copyright © 2009 .. 2013 PMMan.com, a division of 781 Resolution, LLC