Authentication & Encryption Software


  PGP
  SSH
  MD5

  PGP

  PGP Intruduction
Pretty Good Privacy protects documents such as email from unauthorized
reading using public key encryption. (Some versions are export restricted)
PGP Tutorial (for Unix)

  PGP Commands

1. pgp
2. pgpk
3. pgpe
4. pgpv
5. pgps
  PGP Links
 http://www.pgp.com  (US versions)
http://www.pgpi.com (International versions)
http://www.nai.com
http://web.mit.edu/network/pgp.html
http://www.replay.com/menu/pgp.html
ftp://ftp.ifi.uio.no   (For International)


  SSH
SSH Intruduction
         SSH stands for Secure Shell, which is the secure login program that has changed
         remote management of networks hosts over the Internet (an enhance versions of
         rlogin, rsh and rcp that provides RSA authentication and encryption of communications
         as well as many other security improvements.).
         It is a powerful, yet easy-to-use application that uses strong cryptography for
         protecting all transmitted confidential data, including passwords, binary files, and
         administrative commands.
SSH Links
              http://www.ssh.org
              ftp://ftp.cs.hut.fi



  MD5
MD5 Instruduction
      MD5 is a hash function using to the authenticity of a file.

MD5 Links
      http://www.rsasecurity.com
      http://www.rsasecurity.com/downloads/