Showing 1 - 2 results of 2 for search '"Secure shell"', query time: 0.06s Refine Results
  1. 1

    Detecting plaintext recovery attack in secure shell (SSH) by Ahmad Baidowi, Zaid Mujaiyid Putra

    Published 2010
    “…It was discovered lately in the year of 2008. It is known that Secure Shell (SSH) connection is secure enough but this new discovered attack proved that there is vulnerability exist in SSH. …”
    Get full text
    Thesis
  2. 2

    Network digital evidences centralization by using honeynet architecture by Saleh, Mohammed Abbas Alameen

    Published 2009
    “…Sebek Sever/ Client Architecture used here to record key loggers have done under encrypted protocols such as Secure Shell (SSH) and then log these recorded data into the data base. …”
    Get full text
    Thesis