Blog Articles

2025

Disable SSH password authentication on your clients

Attackers set up fake SSH servers, targeting users to unknowingly enter their corporate credentials. Traditionally, SSH security is thought from a server perspective. Did you know you can prevent this attack on the client side with a simple configuration change that almost nobody is aware of?

Read article...

Trust is Good, Control is Better - Sign your Git Commits!

Without signing, Git Commit impersonation is trivially simple. It causes great confusion and can hurt your reputation. Git signing is simple but not well known across developers and repo owners. Learn how to sign your Git Commits and how to protect your repos in a few effective steps.

Read article...

The SSH protocol and SSH Applications - Part 1!

This is the start of a new series looking at the SSH protocol and the SSH applications; we want to share knowledge we gained during the SSH Gateway development. Part 1 is about the SSH core protocol and SSH remote commands. A preview of the upcoming SSH applications is listed as well.

Read article...

The SSH protocol and SSH Applications - Part 2!

The second part focuses on SSH Remote Shell as the most known SSH application. Unfortunately, there is no formal protocol defining a structured way to exchange commands and responses between client and server. A challenge for SSH security Gateways.

Read article...