ZOC is a professional ssh, telnet and serial terminal emulator. With its modern user interface, it has many ways of making your life easier.Its impressive list of emulations and powerful features makes it a reliable and elegant tool that connects you to hosts and mainframes via secure shell, telnet, serial cable and other methods of communication.
ZOC is professional terminal emulation software for Windows and macOS.
Its impressive list of emulations and powerful features makes it a reliable and elegant tool that connects you to hosts and mainframes via secure shell, telnet, serial cable and other methods of communication.
With its modern user interface, this terminal has many ways of making your life easier. In its own way, ZOC is the Swiss Army Knife of terminal emulators: versatile, robust, proven.
SSH is a communication protocol that encrypts and transports data over an unsecured network. Its main purpose is to establish an encrypted way of communication with a remote shell account. ZOC Terminal is the software, which runs on your local computer to connect to the remote server. Once connected, it lets you enter commands and see the output of those commands running on the remote computer.
An especially difficult part of encrypted communication is the need to negotiate a shared secret (the key to use for encryption) over a public channel that could already be compromised.
The negotiation is performed through the so called Diffie-Hellman exchange or one of its many variants. ZOC supports all official Diffie-hellman group exchanges, as well as the more modern ecdsa-sha2 and curve25519-sha256 protocols.
Authenticating describes the process, where the user presents proof of who he is, and the server decides if the user should be allowed access. The SSH protocol describes various methods that can be used for authentication.
Of those, ZOC supports password authentication, pukey exchange, and keyboard-interactive challenge. The public-key exchange comes in various flavors. ZOC understands RSA, DSA, ECDSA, and ED25519 keys. It is also possible to use hardware-based key authentication (e.g. smart cards).
Over time, the SSH protocol has seen a plethora of methods to be used to encrypt the communication (using shared secret was negotiated during the KEX phase as a cryptographic key). Some ciphers were phased out over time, especially after Edward Snowden revealed how powerful possible listeners like the NSA are, and new ones were introduced. ZOC supports the whole list, starting with aes256-ctr and going down to older ciphers like aes256-CBC or arcfour (these older ones may still be necessary to connect to older servers that have not been updated in a while).
An important part of the secure shell protocol is a feature called port-forwarding. This feature allows the user to create a connection from the client computer to the server network, which can be used by other programs and where all the connection data is encrypted. This feature is sometimes called tunneling.
The standard port-forwarding feature requires the client to set up the tunnel source port and destination before making the connection. This means that there is limited flexibility and that for each possible destination, a separate ssh tunnel needs to be set up. With dynamic port forwarding, however, the client sets up a listening port, but when a software connects to the port, it can select the host and port it wants to connect to. The ssh client will then forward the connection request to the SSH server which initiates the connection to the final destination.
In some environments, end-user computers are not allowed to access the outside internet directly. In those cases, connection and data exchange is made by way of an ssh proxy which handles the actual connection to the outside network (internet). There is various types of proxies, which mainly differ in how the ssh client requests a connection to the outside world. The most common types are SOCKS-4, SOCKS-5, and HTTP. ZOC supports connections through those types, as well as connections made through ssh-jump servers.
When a user authenticates an SSH session using a public/private key pair, ZOC supports the SSH agent forwarding technique to provide the key for authentication in secondary ssh sessions (ssh connections to a third server, made from typing an ssh command in the remote shell in the initial connection). If all the servers allow authentication through this specific ssh key pair, it is not necessary to provide the passphrase again for secondary ssh connections.
X11 is a communication protocol that allows a remote computer to run programs with a graphical user interface on a remote computer (normally, the server can show text only through a terminal client). SSH supports a way to tunnel this type of communication between ssh client and server, thus enabling the user to run an X11 command like xeyes on the remote shell and get the window for that displayed on the local computer.
Industry :
Deployment :
Available For :
Single User
Multiple Users
Duration Type :
Multiple Years
Lifetime/Perpetual
Language :
Vendor Website :
Starting from
₹ 5400Per Single License, Perpetual
Starting from
₹ 2025Per Single License, Perpetual
Software © Copyright by EmTec (All data, images, content, links of this software/service are subject to our market research & controlled by the vendor.)
ZOC Terminal Software |
|
|
|
|
Rating & Reviews | ||||
Short Description |
ZOC is a professional ssh, telnet and serial terminal emulator. With its modern ... more |
|||
Deployment |
|
|||
Pricing |
Starting @ ₹ 5400 |
|||
Available For |
Single User Multiple Users |
|||
Powered by | EmTec | |||
Download Brochure |
Not Available |
Adding to Cart...
Not a member?Register
Please check your inbox or spam.