Up and Running with SSH
SSH (Secure Shell), is a remote administration protocol that allows users to control and modify their remote servers over the Internet. The service was created as a secure replacement for the unencrypted Telnet and uses cryptographic techniques to ensure that all communication to and from the remote server happens in an encrypted manner. It provides a mechanism for authenticating a remote user, transferring inputs from the client to the host, and relaying the output back to the client.
How SSH Works?
If you’re Linux or Mac user, then using SSH is simple. If you use Windows, you will need to utilize an SSH client to open SSH connections. The most popular SSH client is PuTTY or Cygwin, which you can learn more about in the resources section of the blog.
For Mac and Linux users, head over to your terminal program and then follow the procedure below:
The SSH command consists of 3 distinct parts:
ssh {user}@{host}
The SSH key command instructs your system that you want to open an encrypted Secure Shell Connection. {user} represents the account you want to access. For example, you may want to access the root user, which is basically synonymous for system administrator with complete rights to modify anything on the system. {host} refers to the computer you want to access. This can be an IP Address (e.g. 244.235.23.19) or a domain name (e.g. www.xyzdomain.com).
When you hit enter, you will be prompted to enter the password for the requested account. When you type it in, nothing will appear on the screen, but your password is, in fact being transmitted. Once you’re done typing, hit enter once again. If your password is correct, you will be greeted with a remote terminal window.
For Linux users, you can use the command “man ssh” to see the various arguments that goes with ssh.
Resources:
PuTTY
Cygwin
ssh manual
One thought on “Up and Running with SSH”