Use the Secure Shell to secure your applications

You can set up the Secure Shell (SSH) to ensure the security of applications that run on the TCP/IP network.

TCP/IP connectivity applications, such as Telnet and FTP transmit data and passwords over the network in plain text. This means that the data and passwords can be intercepted and read by other users on the network.

The Secure Shell (SSH) protocol suite provides secure alternatives for Telnet and FTP. SSH verifies the authenticity of both the client and server. All of the data, including userids and passwords, is encrypted as it travels on the network.

For more information on using SSH, visit the following Web site: Portable Utilities for i5/OS.Link outside the Information Center