O'Reilly logo

Maximum Linux Security by Anonymous

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Protecting Data in Transit

As illustrated in Chapter 7, "Sniffers and Electronic Eavesdropping," many network services (including but not limited to telnet, ftp, http, rsh, rlogin, and rexec) are vulnerable to electronic eavesdropping. This presents a major problem because even in a closed network environment, at bare minimum you must have secure means of moving files, setting permissions, running shell scripts, and so on.

To guard against attackers capturing your day-to-day network traffic, I highly recommend that you install Secure Shell (ssh). This chapter illustrates how to install and use the ssh server and client utilities.

Secure Shell (ssh)

Secure Shell is a secure login system and suitable replacement for telnet, rlogin, rsh ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required