News

Network Shell 3.0 Offers Secure Remote Access

Network Shell 3.0, an Internet and Web administration server from Shpink Software, offers concurrent management of multiple Unix and Windows NT machines from a single Unix or NT administrative machine.

Network Shell provides a shell and Perl environment that allows system administrators and webmasters, value-added resellers (VARs), and resellers to perform secure, automated, and/or interactive system administration of remote hosts without having to telnet or establish a remote shell connection to each host individually.

Web site administrators car replicate content on mirrored Web, e-commerce, and FTP sites and gather remote statistics by issuing commands to multiple machines simultaneously. To enhance productivity, VARs and resellers can use Network Shell to monitor and manage remote devices and hosts over the Internet.

Network Shell optionally includes a Windows NT client that allows NT administrators to use Unix commands to manage remote Windows and Unix systems. For example, using the NT client, administrators can reboot NT machines remotely.

The integrated Perl module enables administrators to write distributed Perl scripts to access remote files and commands. Administrators can automatically check remote disk usage or other status reports from multiple hosts and distribute and install files and run common Unix utilities on remote hosts.

Network Shell supports access control lists to manage host access and permissions on a per-host, subnet, and/or user level with security granularity extending down to the command level.. Sessions to remote hosts can be encrypted up to 128 bits with either DES, Triple DES (3DES), or Blowfish cipher engines.

Network Shell 3.0 is currently available.

Contact Shpink Software, (888) 492-6867, www.networkshell.com.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.