Introduction to SSH
What is SSH? Why use SSH?
SSH is a network protocol similar to telnet or FTP, yet slightly different because it offers secure data communication. Security is very important nowadays because I can say that privacy does not exist anymore. Do you want to protect your data or your customers from prying eyes? Then use SSH, the secure shell.
The best thing about SSH is that it is free and software based solution, which means low-cost or zero-cost. Another great thing about SSH is that it offers implementation for most operating systems so you don’t need to switch to another operating system to use SSH, unless you are using some alien-os.
You can use SSH for remote command-line login, remote command execution, and other secure network services. Why use SSH, when we can use FTP (file transfer protocol) or telnet? The most important reason to use SSH and not FTP or telnet is that SSH encrypts your traffic. Everything that is transfered over FTP or telnet is plain text, your passwords and your usernames. Everything.
There are other programs such as rsh for remote command execution, rcp for file transfers and rlogin for remote logins but their fundamental problem is that they do not offer security. SSH protects your data by encrypting it as it passes over the network, so only the recipients can decrypt it. SSH offers integrity, which means that it guarantees your data will arrive secure and unmodified o the end point and if a third party tries to capture and modify your data, SSH detects it.
Remember, SSH is not a product, it is a protocol. SSH specifies rules in a computer network so computers can communicate securely with each other. Be careful, because SSH will not protect your computer network from viruses, ddos attacks and trojans. SSH will create a secure tunnel for running a shell on a remote computer.
SSH is a protocol that conducts secure communication over a network. It covers authentication, encryption and integrity.
Like us on Facebook
We need your assistance to stay live
This week Top Posts
- Top Things To Do After Installing Ubuntu 13.10 'Saucy Salamander' : Ubuntu 13.10 Saucy Salamander will be released on coming October 17th with many new salient featur...0 comments |
- Install Fail2Ban On Ubuntu Server 13.04/13.10 : Introduction Fail2Ban is an intrusion prevention framework written in the Python programming l...0 comments |
- 5 Android Apps that’s Going to Make Running Your Business Less Stressful : Running a business can be very stressful. You have to think about team collaboration, making sure th...0 comments |
- install Git in Ubuntu : Git is a distributed revision control system with an emphasis on speed. Git was initially designed a...0 comments |
- Install Crashplan backup tool in Linux : CashPlan is an automated backup solution that either uses the CrashPlan Central server or any other ...0 comments |
- Install Corosync and Pacemaker On CentOS 6.5 : I will show you in this tutorial how to install your first cluster Corosync and the Linux Cluster Ma...0 comments |
- 5 Android Apps that’s Going to Make Running Your Business Less Stressful
- Puppet agent Install Using Script
- Install Corosync and Pacemaker On CentOS 6.5
- Install Fail2Ban On Ubuntu Server 13.04/13.10
- How To Install Google Chrome in Fedora 20, 19, 18
- How to surf using Tor Browser Bundle
- New Games got Greenlit on Linux by Steam Today!
- Linux Basics: Zypper Usage On openSUSE
- GNOME’s 3.12 supports Google Cloud Print
- How to enable 32-bit support for 64-bit Ubuntu 13.10 or greater
This work by unixmen.com is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
Copyright © 2008-2013 Unixmen.com .