Consisting of any of the letters of the English alphabet and the numbers 0 through 9.
The process of verifying that an individual truly is who he or she claims to be. Supplying a password is a very common method of authentication.
An algorithm used to encrypt data at varying levels of security. Examples include 3DES, AES, Blowfish, RC4, and Twofish.
A computer or application that uses services provided by a server.
A combination of session settings that specify a variety of colors associated with the terminal window, including foreground and background.
A data path or circuit between two computers over a phone line, network cable, or other media.
The concept that information can be verified as original and unaltered. If data integrity is ensured, information can only be modified by those with proper authorization.
The concept that data should only be viewed or accessed by those with authorization to do so. Data privacy is achieved using a cipher to encrypt data.
To close a communication connection between a client and a server.
Files having filenames that begin with a dot (.)
The process of converting a data transmission into a secret format that cannot easily be read by unauthorized individuals. See also: decryption.
FTP is an abbreviation for the File Transfer Protocol; a protocol used to transfer files between computers on a TCP/IP network.
The repository for host keys sent to SecureFX by SSH servers that it has connected to. These keys are used to authenticate the server.
Identity files are two files containing the public-private key pair used to connect to an SSH server using RSA or DSA authentication. The Identity.pub file contains only the public key and is uploaded to the SSH server. The corresponding Identity file contains both public and private keys. Though \"identity\" is usually the name given to identity files other file names can be used.
Every site that is reachable on the Internet must have a valid IP, or Internet Protocol,address. An IP address should be entered as four numbers separated by period (.) characters (for example: 198.105.232.1).
Message Authentication Code: A component of the SSH2 protocol consisting of a hashing algorithm used to ensure data integrity between an SSH2 client and an SSH2 server communicating over a network connection. The MAC ensures data integrity by protecting against message alteration.
A password used to protect a private key from unauthorized use. It is recommended that a passphrase be assigned to all private keys to prevent unauthorized use, especially in environments where multiple individuals have access to the machine on which the private key files are stored.
An API defining a generic interface to cryptographic tokens.
A PKCS #12 file is a file that contains your X.509 certificate and its associated private key.
The concept of connecting a logical port on a local machine to a port on a remote machine over a secure (encrypted) channel. All requests for services sent to the local port are then forwarded across the secure channel to the corresponding port on the remote machine.
A pair of keys used with RSA or DSA authentication. The public key is usually kept in a file named Identity.pub, which is then transferred to the remote SSH server. Another file usually named Identity contains both the public key and the corresponding private key. This file is kept on the local machine and is used by SecureFX with public key or RSA authentication methods.
A computer program that provides services to other computer programs (called clients).Often the computer on which a server program runs is also called a server. The term host is often used as a synonym for server.
A session is a set of options that are assigned to a connection to a remote machine in SecureFX. These settings and options are saved under a session name and allow the user to have different preferences for different hosts.
The label assigned to a session. For example, a user might use \"Accounting DB\" as a session name for a session that connects to sales.mycompany.com.
SFTP is an abbreviation for the Secure Shell File Transfer Protocol; a secure version of the FTP protocol which is used to transfer files between computers on a network.
SSH is an acronym for the Secure Shell protocol. A communications protocol used to encrypt network traffic between a client and a server.
The first version of the SSH protocol which provides a way to encrypt network traffic between a client and a server.
The second version of the SSH protocol which provides a way to encrypt network traffic between a client and a server, with a slightly different set of security features (including SFTP) than the SSH1 protocol provides.
Telephony API. A standard developed by Intel and Microsoft that manages access to phone lines on a Windows PC. This terminal emulation application uses TAPI to provide phone dialer options. TAPI compliant programs can be running at the same time, using the modem to dial out or receive calls on an \"as needed\" basis.
Transmission Control Protocol/Internet Protocol: TCP/IP is the basic communication method used over the Internet. The TCP on the side of the sending machine is responsible for breaking up a message in to smaller portions called packets. These packets are then sent to their destination and the TCP on the side of the receiving machine is responsible for reassembling the packets to form the original message. The Internet Protocol provides a means of properly addressing each packet so that it arrives at its destination. SSH and FTP, for example, are built upon TCP/IP.
Telnet is a protocol that provides an interface for communications between clients and servers.
A device usually consisting of a keyboard, a display unit such as a cathode ray tube,and a serial port used for entering and sending data to a computer and displaying any data received from the computer. Terminals are usually connected to a computer a serial line or some other type of connection. There are many terminal types including VT100, VT102, VT220, and others.
A program that emulates a terminal.
The process of transporting X11 data over an encrypted channel from a remote machine to a local machine.