SSH

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2.

The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.

 SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on.

 

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

How to Install ConfigServer

Install ConfigServer Security & Firewall rm -fv csf.tgz wget...

Data Loss

Backups and Data Loss :         Leasedlayer is not responsible for...

DirectAdmin Introduction

DirectAdmin is a graphical web-based web hosting control panel designed to make...

Install Latest RootKit Hunter

Here we instruct that how to install latest released version of RootKit Hunter . Below we have...

Install ffmpeg/ffmpeg-devel on CentOS 5.7 64bit

Installing FFMPEG , FFMPEG DEVEL.1 ) Login in SSH using putty.exe software . With VPS or...

Powered by WHMCompleteSolution