Introduction
An administrator running a network needs to securely provide services to users. This chapter introduces some common network services.
Secure Shell, or SSH, is used to provide remote access to systems. It is typically used to provide command-line access, but SSH can also be used with an X Server to provide a graphical interface. SSH also be used to copy files using sftp and scp. Although SSH is robust, it is not without its security issues. When using passwords for authentication, it is vulnerable to a brute force attack.
FTP servers are an older way to share files. Today, FTP servers are used ...