SSH Communications Security

Results: 9



#Item
1Secure Shell / Software / Computing / System software / SSH Communications Security / SSH File Transfer Protocol / SSH / OpenSSH

“HOW I INVENTED SSH AND CHANGED THE SYSADMIN WORLD” Tatu Ylönen Chief Executive Officer, SSH Communications Security 1

Add to Reading List

Source URL: www.whd.global

Language: English - Date: 2016-03-30 08:21:58
2

ELBA HORTA Regional Sales Manager, Southern Europe SSH Communications Security Elba brings more than 15 years of experience in both business and technology side to the company, where she is responsible for sales, busines

Add to Reading List

Source URL: www.abieventi.it

- Date: 2015-05-04 04:47:49
    3Cryptographic software / Internet protocols / Internet standards / Secure Shell / OpenSSH / Telnet / Rlogin / File Transfer Protocol / SSH Communications Security / System software / Software / Computing

    Risks of Unmanaged Encrypted Environments  to Critical National Infrastructures Tatu Ylönen Founder and CEO SSH Communications Security

    Add to Reading List

    Source URL: www.jnsa.org

    Language: English - Date: 2014-02-04 01:44:37
    4Technology / Secure Shell / Nokia / Mobile operating system / SSH Communications Security / Android / Smartphones / Software / Computing

    *For release on March 2, 2015, 11.00am CET* Jolla announces plans for ‘Sailfish Secure’ - the first truly open and secure mobile phone platform - Jolla partners with SSH Communications Security and invites others to

    Add to Reading List

    Source URL: cdn.jolla.com

    Language: English - Date: 2015-03-02 06:15:36
    5Secure Shell / Software / SSH Communications Security / Cryptographic protocols / SSH1 / Ssh-keygen / Remote administration software / Ssh-agent / Cryptographic software / Cryptography / System software

    SSH Communications Security Rolls Out Free Discovery Tool to Identify Risks in  Secure Shell Environments    SSH Risk Assessment Tool Enables Auditors and Security Teams to Quickly Collect and

    Add to Reading List

    Source URL: www.infosecurityproject.com

    Language: English - Date: 2014-10-23 00:03:39
    6Secure Shell / Software / SSH Communications Security / Cryptographic protocols / SSH1 / Ssh-keygen / Remote administration software / Ssh-agent / Cryptographic software / Cryptography / System software

    SSH Communications Security Rolls Out Free Discovery Tool to Identify Risks in  Secure Shell Environments    SSH Risk Assessment Tool Enables Auditors and Security Teams to Quickly Collect and

    Add to Reading List

    Source URL: www.infosecurityproject.com

    Language: English - Date: 2014-10-23 00:12:56
    7Secure Shell / Software / SSH Communications Security / Cryptographic protocols / SSH1 / Ssh-keygen / Remote administration software / Ssh-agent / Cryptographic software / Cryptography / System software

    SSH Communications Security Rolls Out Free Discovery Tool to Identify Risks in  Secure Shell Environments    SSH Risk Assessment Tool Enables Auditors and Security Teams to Quickly Collect and

    Add to Reading List

    Source URL: www.infosecurityproject.com

    Language: English - Date: 2015-02-04 04:23:30
    8Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

    An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2002-09-20 17:38:46
    9Cryptography / Secure Shell / OpenSSH / Ssh-keygen / SSH Communications Security / Remote administration software / Ssh-agent / BoKS / System software / Cryptographic software / Software

    Data Sheet SSH Risk Assessor™ Identify Risk and Compliance Issues in Secure Shell Environments The vast majority of large enterprises and government organizations around the world rely on Secure Shell (SSH) to ensure

    Add to Reading List

    Source URL: www.jvl.fr

    Language: English - Date: 2013-11-04 03:26:33
    UPDATE