About Secure Shell Terminals

Connectivity Secure Shell

About Secure Shell Terminals

Typically, terminal connections to remote UNIX hosts use the TELNET protocol. TELNET, however, presents several vulnerabilities that an attacker can exploit to gain access to sensitive data in transit over the network. Not only can attackers view the data to acquire secret login information, for example, but they can also alter and reroute the data.

When you install Connectivity Secure Shell alongside HostExplorer, you gain the option of creating Secure Shell-enabled HostExplorer VT session profiles. You can then use these session profiles to launch secure VT sessions, which are tunnelled through the Secure Shell protocol instead of using unsecured TELNET connections.