Remote exeution of applications Flashcards
1
Q
rlogin command
A
- OpenSSH remote login client
- insecure
2
Q
rsh command
A
- OpenSSH remote login client
- insecure
3
Q
telnet command
A
Name:
TErminal NETwork
- user interface to the TELNET protocol
- entire connection is unencrypted
4
Q
ssh command
A
Name:
Secure SHell
Types of keys:
- User key(within users)
- Host key(within remote system)
- Session key(needed when large amount of data is to be transmitted)
5
Q
ssh procedures
A
- Public keys from the locat computers are passed to the server
- Servers then identifies if the public key is registered
- If so, the server then creates a new secret key and encrypts it with the public key
- This encrypted code is sent to the local computer
- This data is unlocked by the private key of the local system and is sent to the server
- Server after receiving this data verifies the local computer
- SSH creates a route and all the encrypted data are transferred through it without security issues