Showing 1 - 1 results of 1 for search '"Secure shell"', query time: 0.05s Refine Results
  1. 1

    Network digital evidences centralization by using honeynet architecture by Saleh, Mohammed Abbas Alameen

    Published 2009
    “…Sebek Sever/ Client Architecture used here to record key loggers have done under encrypted protocols such as Secure Shell (SSH) and then log these recorded data into the data base. …”
    Get full text
    Thesis