Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


 Why would you want to use SSH from a Windows pc?



 Why would you want to use SSH from a Windows pc?..

Answer / chaitanya

SSH (TCP port 22) is a secure connection used on many different systems and dedicated appliances. Routers, Switches, SFTP servers and unsecure programs being tunnelled through this port all can be used to help harden a connection against eavesdropping. Despite the fact that most times when you hear about somebody ‘SSHing’ into a box it involves Linux, the SSH protocol itself is actually implemented on a wide variety of systems – though not by default on most Windows systems. Programs like PuTTY, Filezilla and others have Windows ports available, which allow Windows users the same ease-of-use connectivity to these devices as do Linux users.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More Computer Security Interview Questions

What is XSS?

1 Answers  


 What is the difference between an HIDS and a NIDS?

1 Answers  


 What are salted hashes?

1 Answers  


Is a console a computer?

0 Answers  


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

0 Answers  


Why would you bring in an outside contractor to perform a penetration test?

1 Answers  


 What is the difference between a Black Hat and a White Hat?

1 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


What is the most commonly used computer application?

0 Answers  


 You see a user logging in as root to perform basic functions. Is this a problem?

1 Answers  


 What is Exfiltration?

0 Answers  


What is SSL and why is it not enough when it comes to encryption?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)