Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way.

  • SSH was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.
  • SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols.
  • SSH uses PublicKeyCryptography? to authenticate the remote computer and allow it to authenticate the user, if necessary.
  • There are several ways to use SSH:
    1. one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on.
    2. another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. (see SSH_Skills for detail)

See for detail -

See also

Last modified 4 years ago Last modified on Apr 5, 2015, 4:42:13 AM