SSH Case Studies: Pine and IMAP

In this eighth part of a nineteen-part article series on advanced topics in SSH, you’ll learn about the e-mail program Pine, IMAP authentication, and how to handle it all through the secure shell. This article is excerpted from chapter 11 of the book SSH, The Secure Shell: The Definitive Guide, Second Edition, written by Daniel J. Barrett, Richard E. Silverman and Robert G. Byrnes (O’Reilly; ISBN-10: 0596008953).

More: continued here


Admin / Webmaster for A+ Computer Professionals, and its website located at

Web Hosting Valdosta