Browse By Repository:

 
 
 
   

The Comparison Between Secure Shell (SSH) And TELNET Using Network Analyzers

Nuni Natassa , Mohd Sani (2006) The Comparison Between Secure Shell (SSH) And TELNET Using Network Analyzers. Project Report. Melaka, Malaysia, UTeM. (Submitted)

[img] PDF (24 Pages)
The_Comparison_Between_Secure_Shell_(SSH)_And_Telnet_Using_Network_Analyzers_-_Nuni_Natassa_bt_Mohd_Sani_-_TK5105.5.N86_2006_24_Pages.pdf - Submitted Version

Download (1MB)
[img] PDF (Full Text)
The_Comparison_Between_Secure_Shell_(SSH)_And_Telnet_Using_Network_Analyzers_-_Nuni_Natassa_bt_Mohd_Sani_-_TK5105.5.N86_2006.pdf - Submitted Version
Restricted to Registered users only

Download (18MB)

Abstract

The project "The Comparison Between Secure Shell (SSH) and Telnet Using Network Analyzers" is a research on differentiate two types of data transmission approaches over the computer network using three different network analyzers. In this project, the network analyzers that are being used are Wireshark, Colasoft Capsa and Commview. In order to giv1e the guideline on differentiating the two approaches, basic knowledge about the meanings and concepts for Secure Shell (SSH) and Telnet is crucial. First, it is important Ito get know Telnet as SSH is an improvement of the existing Telnet. Telnet is a m:twork protocol used on the Internet or local area network (LAN) connections. The Telnet typically used to provide user oriented command line login sessions between hosts on the Internet. Meanwhile SSH is an advanced protocol providing :secure encrypted remote communications over an unsecured channel, such as the Internet. A hostile user has control over the network can only force SSH session to disconnect, but cannot decrypt or play back the traffic, or hijack the connection. SSH has takes the place of Telnet, which is insecure, and uses encryption to protect both lihe exchange of username and password as well as all data that is passed between the lremote client and the network server. The SSH works in a similar manner to Telnet, !md many of the interfaces that have been developed look just like the Telnet clients lnat users have become accustomed to.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Computer networks -- Security measures, Computer networks -- Design and construction, UNIX Shells
Subjects: T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Final Year Project > FTMK
Depositing User: Nooraidillah Rasdi
Date Deposited: 01 Jul 2013 02:41
Last Modified: 28 May 2015 03:56
URI: http://digitalcollection.utem.edu.my/id/eprint/8383

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year