m (Created page with "<div align=justify>Secure Shell (also known as SSH and Secure Socket Shell) is a UNIX-based command interface and protocol for securely getting access to a remote server or compu...") |
m |
||
Line 1: | Line 1: | ||
− | <div align=justify>Secure Shell (also known as SSH and Secure Socket Shell) is a UNIX-based command interface and protocol for securely getting access to a remote server or computer. Linux and Unix users' command line is called a shell. You can use Shell to log in to another computer over a network and execute commands on a remote computer. It can also be used for file transfer (using SFTP ('secure FTP'). SFTP is a program that uses SSH to transfer files. Unlike standard FTP, it encrypts both commands and data, protecting passwords and sensitive information. It is functionally similar to FTP, but because it uses a different protocol, you can't use a standard FTP client to connect to an SFTP server. | + | <seo title="What is SSH" metakeywords="sftp,shell,ssh,ssh client,secure FTP" metadescription="What is SSH" /><div align=justify>'''Secure Shell''' (also known as '''SSH''' and '''Secure Socket Shell''') is a UNIX-based command interface and protocol for securely getting access to a remote server or computer. Linux and Unix users' command line is called a shell. You can use Shell to log in to another computer over a network and execute commands on a remote computer. It can also be used for file transfer (using '''SFTP''' ('secure FTP'). SFTP is a program that uses SSH to transfer files. Unlike standard FTP, it encrypts both commands and data, protecting passwords and sensitive information. It is functionally similar to FTP, but because it uses a different protocol, you can't use a standard FTP client to connect to an SFTP server. |
You can use secure FTP with a graphical SFTP client or at the command line. | You can use secure FTP with a graphical SFTP client or at the command line. | ||
− | SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate and passwords are protected by being encrypted. SSH uses RSA public key cryptography for both connection and authentication. The SSH feature is primarily for advanced users with a working knowledge of UNIX. | + | SSH commands are '''encrypted and secure''' in several ways. Both ends of the client/server connection are authenticated using a digital certificate and passwords are protected by being encrypted. SSH uses RSA public key cryptography for both connection and authentication. The SSH feature is primarily for advanced users with a working knowledge of UNIX. |
Once you're logged in with SSH client, it will communicate with the remote computer. As the connection is secured,it makes the connection non vulnerable to malicious attack like hijacking messages to inspect and modify transmitted data. Should another person try to get in, Shell will automatically act as a shield. If the intruder continues his attempts to break in, SSH client will simply disconnect. | Once you're logged in with SSH client, it will communicate with the remote computer. As the connection is secured,it makes the connection non vulnerable to malicious attack like hijacking messages to inspect and modify transmitted data. Should another person try to get in, Shell will automatically act as a shield. If the intruder continues his attempts to break in, SSH client will simply disconnect. | ||
Since it is compatible with all major operating systems, you won't have any trouble installing and using SSH clients on Windows, Unix and Macintosh</div> | Since it is compatible with all major operating systems, you won't have any trouble installing and using SSH clients on Windows, Unix and Macintosh</div> |