SSH2 in pkgadd?

Posted on 2001-06-04
Last Modified: 2010-04-11
Does anyone know where I can find SSH2 (2.4.x preferably) for Solaris 2.6?  much thanks in advance
Question by:szeigle
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 11

Accepted Solution

geoffryn earned 200 total points
ID: 6156424
F-secure should have a ver 2.4 SSH client for Solaris, but it is not free.
LVL 14

Expert Comment

ID: 6156433
Umm, on the SSH CD?

SSH2 is strictly commercial only.  If you want something for free, use OpenSSH (  You can find a pre-compiled Solaris/Sparc version at

Expert Comment

ID: 6159097
LVL 14

Expert Comment

ID: 6159635
That's OpenSSH, same as at

Author Comment

ID: 6181960
Thanks for the link.  This should work.

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month9 days, 23 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question