Send us a question or comment

White Papers

VanDyke's Secure Shell white papers are for computer and software industry professionals and managers investigating secure access solutions with Windows workstations or servers as components. They are also for SSH administrators who are looking to maximize the value of secure access services to their user base.

Understanding Host Keys

Users and administrators turn to Secure Shell for many reasons. Some need to replace Telnet or FTP. Others are looking to move away from simple passwords to public-key, Kerberos, or keyboard-interactive authentication. Still others are looking for a low-cost alternative to VPNs. Whatever the reason for using Secure Shell, every user and administrator of Secure Shell needs to understand host keys. Understanding what host keys are, how they work, and the security they provide can reduce confusion and possible frustration about administering and using this authentication tool for both administrators and end users.


Secure Shell: An Overview

Secure Shell (SSH) provides an open protocol for securing network communications which is less complex and expensive than hardware- based VPN solutions. Secure Shell client/server solutions provide command shell, file transfer, and data tunneling services for TCP/IP applications. SSH connections provide highly secure authentication, encryption, and data integrity to combat password theft and other security threats.


Secure File Transfer

Data delivery over the Internet can be simple, convenient, and cost-effective - but it must also be secure. The Secure Shell (SSH2) protocol provides an alternative to nonsecure FTP. This paper explains the Secure Shell File Transfer Protocol (SFTP) and presents specific applications for system administration, finance, health care, and business-to-business.


Tunneling with Secure Shell

Remote access to network resources is increasingly a business requirement, but external network threats must be neutralized. A Secure Shell (SSH) capability called port forwarding allows nonsecure TCP/IP data to be tunneled across public and private networks through a secure, encrypted connection. The benefits of port forwarding are illustrated by a series of concrete examples.