rcfrgf said:
If I want to use SSH (secure shell) Protocall, how is it done?
That would depend largely upon why you want to use it. What,
specifically, are you trying to accomplish? You haven't provided any
useful information with which we could possibly tailor our advice. That
being the case, let's start with some basics, then:
http://en.wikipedia.org/wiki/Ssh
http://en.wikipedia.org/wiki/SSH_file_transfer_protocol
http://encyclopedia2.thefreedictionary.com/SSH
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214091,00.html
There are literally dozens available. You'd use the one that fits your
specific needs and budget. A couple possibilities:
http://www.ssh.com/
http://www.openssh.com/
http://www.celestialsoftware.net/
Can it be attached to tor?
Who knows? What do *you* mean by "tor?"
The only TOR I'm aware of is "The Onion Router," which uses clear text:
"As Tor does not, and by design cannot, encrypt the traffic between an
exit node and the target server, any exit node is in a position to
capture any traffic passing through it which does not use end-to-end
encryption, e.g. SSL. While this does not inherently violate the
anonymity of the source, it affords added opportunities for data
interception by self-selected third parties, greatly increasing the risk
of exposure of sensitive data by users who are careless or who *mistake*
Tor's anonymity for security." (Emphasis mine)
http://en.wikipedia.org/wiki/Tor_(anonymity_network)#Weaknesses
--
Bruce Chambers
Help us help you:
http://support.microsoft.com/default.aspx/kb/555375
They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety. ~Benjamin Franklin
Many people would rather die than think; in fact, most do. ~Bertrand Russell
The philosopher has never killed any priests, whereas the priest has
killed a great many philosophers.
~ Denis Diderot