TechSpace Knowledgebase
Search:     Advanced search
Browse by category:
Contact Us

Secure Shell

Views: 153
Votes: 0
Posted: 07 Sep, 2016
by:
Updated: 08 Sep, 2016
by:

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best known example application is for remote login to computer systems by users.

SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with anSSH server.[2] Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use onWindows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.[3]

SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rloginrsh, and rexecprotocols. Those protocols send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.[4] The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH, allowing them to read the content of SSH sessions.

cr.https://en.wikipedia.org/wiki/Secure_Shell

Others in this Category
document How to ping test in Windows XP
document How to ping test in Windows 7 and Vista
document How to ping test in Windows 8
document Remove a saved wireless network
document How to Set a Manual IP Address in Mac OS X
document How to map a network drive in Mac OS X
document SAMSUNG BRINGS JAVASCRIPT TO THE INTERNET OF THINGS
document Telnet
document Internet Control Message Protocol
document Point-to-Point Protocol
document How to Use VPN on Your Mac



RSS