Examples of using Secure shell in English and their translations into Polish
{-}
-
Computer
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
Secure shell ssh.
Kermit file transfers with Secure Shell connection.
Secure shell access SSH.
Connect to a remote computer using Secure Shell.
Select this to use the secure shell to login to the remote host.
Secure Shell Tunneling is similar to SSL
system status to display list when selecting for secure shell.
SSH 22 secure shell server, encrypted authentication
ISH- a GNU implementation of the Secure Shell protocols.
Free Secure Shell server with fine grained sessions control and battery saving design.
MidpSSH offers the ability to connect SSH(Secure Shell) and Telnet from any mobile device….
has been designed as a drop-in replacement for the SSH(Secure Shell) protocol.
This is an all-Perl module implementing an SSH(Secure Shell) client, both SSH-1 and SSH-2 protocols.
SSH Secure Shell Client allows system administrators to remotely login, execute commands,
SSH access using the Google Chrome Secure Shell has now been integrated into the NST IPv4 Tools widget.
It offers a Ncurses-based text-mode interface that runs on any X11 terminal emulator or over SSH(Secure Shell) and other remote shells. .
From a console window make a secure connection to a secure shell server you have access to,
In computing, Secure Shell or SSH is a set of standards
Now, if you needed to access an intranet page within the network that your secure shell server is hosted,
ZOC is a professional telnet or Secure Shell(SSH) client
comes with a built-in SSH client(Secure Shell), a merge tool
a remote terminal program created from the ground up as an alternative for SSH Secure Shell.
The connection between the factory and the platform located in the cloud is provided by a Secure Shell(SSH) connection that is encrypted and compressed for efficiency.
It is mostly a web-based SSH(Secure Shell) console that helps Amazon EC2 users to execute commands,
IT administrators can remotely access the Turbo NAS via Telnet or the encrypted Secure Shell(SSH); and execute commands for advanced programming or troubleshooting.
subset of the Secure Shell Protocols SSH.
restore your files over Netcat or SSH(Secure Shell), and comes with a built-in archive protection
VShell Secure Shell server for Windows,
IT administrators can secure the connections with the encrypted Secure Shell(SSH), and execute commands for advanced programming or troubleshooting.
SSH: Administrators can remotely access the NAS server by command line via Telnet or the encrypted Secure Shell(SSH); and execute commands for advanced programming