February 23, 2001
Ultimate Tour Guide for Securely Transferring Files
Sebastopol, CA--"Network security is an increasingly hot topic, and with
around two million SSH users across the globe, the information in
SSH, The Secure Shell: The
Definitive Guide is pretty timely," says Daniel J. Barrett, coauthor of
this new O'Reilly release (US $39.95).
SSH, the Secure Shell*, is a popular, robust, and powerful software-based
approach to network security. Whenever data is sent by a computer to the
network, SSH automatically encrypts it. When the date reaches its intended
recipient, SSH automatically decrypts it. The result is "transparent"
encryption--users can work normally, unaware that their communications are
safely encrypted on the network. SSH is an extremely valuable tool that helps
users more safely navigate today's Internet, and helps system administrators
secure their networks or perform remote administration. It supports secure file
transfer between computers, secure remote logins, and a unique "tunneling"
capability that adds encryption to otherwise insecure network applications.
Best of all, SSH is free, with feature-filled commercial versions available as
Because of its flexibility--as well as the existence of multiple
implementations for various operating systems--newcomers to SSH frequently have
lots of questions.
"SSH, The Secure Shell: The
Definitive Guide is written for a wide, technical audience: individuals
running Linux machines at home, corporate network administrators with thousands
of users, or PC/Mac owners who just want a secure way to telnet or transfer
files between machines," explains Barrett. "The material starts with simple
installation and use of SSH, but runs all the way to in-depth case studies for
highly secure computing environments."
SSH: The Secure Shell: The Definitive Guide covers the Secure Shell
in detail for both system administrators and end users. It demystifies the SSH
man pages and includes thorough coverage of:
Installing and maintaining SSH systems
Configuring SSH servers and clients with recommended settings to
SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, Windows and Macintosh
Advanced key management using agents, agent forwarding, and forced
Tunneling of TCP and X11 applications in depth, even in the presence of
firewalls and network address translation (NAT)
Undocumented behaviors of popular SSH implementations
Troubleshooting a wide variety of common and not-so-common
So whether you're shipping information on a small LAN or across the
Internet, SSH can ferry your data from here-to-there efficiently and securely,
with O'Reilly's SSH: The
Secure Shell as the ultimate tour guide.
*"SSH" is pronounced by spelling it aloud "S-S-H." The name Secure Shell might
seem a little puzzling, as it isn't a shell at all. The name was coined from
rsh utility, an ubiquitous Unix program that also
provides logins, but is not very secure.
SSH, The Secure Shell: The
By Daniel J. Barrett & Richard Silverman
ISBN 0-596-00011-1, 540 pages, $39.95 (US)
O'Reilly Media spreads the knowledge of innovators through its books, online services, magazines, and conferences. Since 1978, O'Reilly Media has been a chronicler and catalyst of cutting-edge development, homing in on the technology trends that really matter and spurring their adoption by amplifying "faint signals" from the alpha geeks who are creating the future. An active participant in the technology community, the company has a long history of advocacy, meme-making, and evangelism.
Return to: O'Reilly Press Room
Recent Press Releases
Press Release Archive »
Media Relations - North America & Conferences
Media Relations - Germany
Media Relations - Japan
Media Relations - United Kingdom