NEED SOME HELP
CLICK HERE OR CALL US ON

Go4hosting +91-120-6025102

Go4hosting 1-888-288-3570

Delivering Excellence in Data center Hosting Solutions since 2000
Submit

Have questions? Let us answer them all!

ZtQON

Hosting Wiki

What is SSH?

SSH expandable to Secure Shell is a secure protocol for the network system administrators to log into a remote server or computer. It is program that carries out commands and moves files from one computer to another on the internet. SSH uses port 22 to connect the two machines on the internet. It is a very useful technique for a network administrator to access their business server remotely from any other location. It is an effective way to create connections on the net maintaining privacy without any hacker intrusion. It ensures highest possible authentication and secured communication like passwords, public keys and other similar sensitive data over insecure network channels like the internet. It is an improvement upon the Telnet to transfer information in a more secure form. Because of its high capabilities of encrypting everything it receives and sends it is widely used to secure all insecure connections.

Features of SSH:

- The entire communication that takes place is encrypted and prevents snooping by unwanted intruders.
- It has the mechanism to check there is no tampering in the information being shared between the two machines
- It allows the users to reconfirm that it is the same server connection that they had been connecting to in the previous occasions.
- It allows the users to login and administer their accounts and perform functions like file transfer and running applications on the remote computer.
- SSH is compatible to all the operating systems like UNIX, Windows and Mac.

How does it work:

To establish a SSH connection the first need is to make a secure connection between the server and the client. The client authenticates the server connection and this creates a secured symmetric channel between the client and the server. The client gets a prompt on the screen when they login for the first time to reconfirm the connection.

Authentication methods:

Public key authentication: it is a strong and most secure method where the client has a public key and a private key. The private key is stored on the machine the client’s logins from while the public key is on the server they are connecting with. The SSH uses the public key to encrypt and lock the communication and it can only be unlocked by the private key.

Password Authentication: It is the easiest way of authentication. The user/ client specifies a user name and a password. That is encrypted through the symmetric key that is only known to the two of them.

Free Virtual Machine

Blogs

A Comprehensive Guide to Cloud Security in 2020

Cloud Security: An Introduction Cloud technology has grown by leaps and bounds over the last 15 years. With the cloud becoming mainstream, cloud security has become all the more important. Cloud se....

Read more>>

10 Key Factors to Consider when Buying Dedicated Server Hosting for your Business

As the world experiences digital disruption, organizations far and wide are taking their businesses online. Websites have become a crucial link between a company and its customers. If you own a websit....

Read more>>

Submit Query

Please fill in the form below and we will contact you within 24 hours.

  • Go4hosting
  • Go4hosting
  • Go4hosting
  • Go4hosting
  • Go4hosting
  • Go4hosting
  • Go4hosting
  • Go4hosting
Hosting Support
+91-120-6025102
Live-chat-icon
Live Chat
Go4hosting Footer
Click here for download from Google Playstore |

AWS Standard Consulting Partner

  • Go4hosting
  • Go4hosting

Alibaba Cloud

Go4hosting

Drupal Reseller Hosting Partner

USA Address:

Go4hosting
10685-B Hazelhurst Dr. # 15644
Houston, TX 77043
USA
Phone: 1-888-288-3570
Email: [email protected]

Go4hosting