Secure Communications Resources
This page covers secure communications with
New location: http://www.adelphi.edu/~spock/secure.html
This is a list of resources for Secure Shell (SSH) on various
platforms. Read the note
on the patent issue with RSA implementations.
Desktop systems (Mac/PC)
For Windows 9x/NT systems, you can get:
Looking for scp? Try WinSCP.
Looking for sshd for WinNT? Try Sergey Okhapin's site. Find
some setup info here.
For Macintosh systems, you can get:
- The F-Secure
SSH client (commercial trial version) by DataFellows.
- The SSH-enhanced
version of BetterTelnet (free) by Ralf Braun. (SSH support
seems to be been delayed due to export restrictions - current
status: see MacSSH)
- The SSH-enhanced
version of NiftyTelnet (free) by Jonas Wallden. This
implementation does not support port forwarding/tunnelling (use Java-based MintTerm for that).
Supports SSH1, scp (Secure Copy) and RSA authentication.
- Another modification of BetterTelnet, known as MacSSH. Supports SSH2 only, and port forwarding/tunnelling.
- Databeast uses a modified version of DataComet for
SSH1/SSH2-enabled communications. Supports SCP. Demo copy
For OS/2 systems, you can get:
- sshCE is
supposedly in the works.
- MindTerm, an SSH client,
written entirely in Java. Both
Applet and full versions exist.
an SSH server, also written in Java, used for tunneling.
- MindVNC, a VNC client in Java supporting SSH.
- Cedric Gourio's Java-SSH.
Workstations and servers
Other SSH tips
- Thomas Koenig's SSH
FAQ. (Seems to be slightly out of date, but still useful)
- A new FAQ on the
- There is a broken link in the SSH FAQ for gwpop, a Perl script for handling SSH
access to POP mail from a Unix host.
- Andy Polyakov's Beyond the
Secure Shell tips for Secure FTP and NFS, and some
This sections discusses the quasi-standard for secure web
transactions, the Secure Sockets Layer (SSL), and its successor,
the Transport Layer Security (TLS) standard.
This section discusses the Secure Remote Password authentication
This section discusses the IPSEC standard and its implementation.
This section has a few pointers on token-based authentication.
This is often referred to as an example of strong authentication.
Home page: Sven Dietrich.
Last modified: 19 December 2001