Berkeley CSUA MOTD:Entry 17241
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2000/1/14-17 [Computer/SW/Security] UID:17241 Activity:nil
1/14    can't find ssh client for win 3.11. help? (and pls don't suggest to
        upgrade to win 95/98/NT.) thanks in advance.
        \_ LINUX! RIDE BIKE!
        \_ I think you can just telnet the non-secure way, use the one-time
           password generator at http://www.csua.berkeley.edu/skey or
           elsewhere to generate the one-time password, then manually type
           the password in your non-secure telnet.
        \_ F-Secure ssh for Win32 will run on Win 3.11 -sony
           \_ http://www.zip.com.au/~roca/ttssh.html
        \_ Can you run java? If so: http://www.mindbright.se/mindterm
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (74 bytes)
www.csua.berkeley.edu/skey -> www.csua.berkeley.edu/skey/
The Java OTP Calculator Sorry, your browser doesn't do java. References 1.
Cache (1247 bytes)
www.mindbright.se/mindterm -> www.appgate.com/products/5_MindTerm/
It contains an extremely powerful and easy to use SSH client that provides advanced features such as tunneling support, file transfer GUI as well as support for HTTP and SOCKS proxies. MindTerm client also includes an integrated xterm/vt100 terminal emulator. It has the ability to run both a standalone application and as an applet. Typical applications SSH Host access MindTerm is very well suited for technically skilled users in situations where you have an open network architecture with direct SSH based host and server access. Zero installation requirements With the Applet version of MindTerm its possible to run a secure terminal session from a Java enabled web browser, eg when traveling and on lent computers. OEM integration Integration into other products to achieve java based secure terminal network access and/or file transfer. OEM customers MindTerm source code has a well defined API and the MindTerm library is easy to use and has successfully been integrated into many third-part products. If you have a more protected network and users with less technical skills you may want look into our other SSH based product, the AppGate Security Server. Below you find a comparison between MindTerm and other AppGate SSH based products.
Cache (3504 bytes)
www.zip.com.au/~roca/ttssh.html
This version provides some protection against traffic analysis by padding the transmitted SSH password with NULs. Only one of them affects TTSSH: 11 a vulnerability using IDEA. Therefore, it is now completely legal to use the standard "international" TTSSH package within the USA. This means anyone is now free to do almost anything they want with the source code. I've released the new version because I don't like depending on luck (and it should make some of the forwarding features work again). This includes several bug fixes and TIS authentication (thanks to Dean Thompson for help with that). I just don't have the resources to do it, especially since I can only work on it during the few weeks each year I'm outside the US, and that time is important to me for other reasons. I'd be happy for someone else to pick up the code and add it :-). I've fixed most of the known bugs, added proper support for X forwarding and UI for all the forwarding options, and added a couple of other doodads ("/ssh-autologin" option, in particular --- see the 14 documentation page for details. Also, it looks like it will be hard to integrate all its features into Teraterm without significantly modifying the design of the main Teraterm application. There's no way I'll have enough time overseas in the foreseeable future to undertake this project, sorry. Note that, due to an oversight, the version number in the file was not updated. Since I'm returning to the USA tomorrow, this will be the last release for several months unless an overseas maintainer is found. Non-SSH sessions used to crash at the end of the session. I released the debug version by mistake and it didn't work for many people. How to Obtain and Install TTSSH Currently TTSSH is only available for Win32 platforms (Windows 95 and NT). Again, I don't have the tools to compile it anywhere else, and someone else may be able to help. The following instructions will also serve to update an old version of TTSSH. The latest build of TTSSH requires this (this was an error in the build process, sorry). How to Use TTSSH There is now a 21 TTSSH documentation page. What the Government Wants You to Know This code contains cryptographic software covered by US ITAR regulations and by the laws of various countries. Its distribution and use may be restricted by these laws and regulations. In particular, it is probably illegal to make the binary code publically available at a US site. What I Want You to Know All the usual free software legalese applies. The software is provided entirely "as is", and use is entirely at the discretion and risk of the user. Who to Thank * This code started with Ian Goldberg's Top Gun SSH for the Pilot. The LIBEAY32 used by TTXSSH is a plain "out-of-the-box" build. That library is 1995-1996 Jean-loup Gailly and Mark Adler. Mileage with other platforms may vary, but I'm interested in getting bug reports. However, please only send me bug reports for the latest version of TTSSH! Known bugs: * Sometimes the remote host will disconnect and the window will not close even if you've specified "close window on disconnect". This happens when a dialog box or message box is showing when the disconnect is detected. This is actually a Teraterm "feature", and there's nothing I can do about it. What the Terms and Conditions Are You can download and use TTSSH for absolutely free. Note that the terms for the source package are a bit looser, so if you build your own version of TTSSH then you have even more rights.