What is SSH?

Albertwu

New member
SSH, the Shell Secure abbreviation developed by the IETF network working group (Working Group Network). SSH is aimed at the establishment of the application layer and the transport layer based on the security agreement.

Traditional network service programs, such as FTP, pop and telnet is not actual safe; because they are on the network with plain text transmission of data.User account and password is accessed easily by man in the middle attack mode of attack. That is to say the existence of another person or a machine posing as a real server to receive the user data transmitted to the server, and then posing as the user data to the real server.

However SSH is currently more reliable, designed for remote login sessions and other network services to provide security protocols. Using SSH protocol can effectively prevent information leakage in the process of remote management. You can encrypt all the data transmitted, but also to prevent the DNS and IP through SSH

Another advantage of SSH for its transmission of the data is compressed, so you can speed up the transmission. SSH has a lot of functions, it can replace the Telnet, but also for FTP, POP, or even for the PPP to provide a secure channel.

your comments?
 
SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer. SSH also refers to the suite of utilities that implement the protocol.
 
SSH also refers to the suite of utilities that implement the protocol. Secure Shell provides strong authentication and secure encrypted data communications between two computers connecting over an insecure network such as the Internet.

What is Secure Shell (SSH)? - Definition from WhatIs.com

searchsecurity.techtarget.com/definition/Secure-Shell
 
SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryptionis enabled.
 
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.

SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rlogin, rsh, and rexec protocols. Those protocols send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH, allowing them to read the content of SSH sessions.
 
Last edited:
SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer. SSH also refers to the suite of utilities that implement the protocol. Secure Shell provides strong authentication and secure encrypted data communications between two computers connecting over an insecure network such as the Internet. SSH is widely used by network administrators for managing systems and applications remotely, allowing them to log in to another computer over a network, execute commands and move files from one computer to another.
 
SSH, additionally known as Secure Socket Shell, is a network protocol that gives administrators with a safe way to access a remote computer. SSH additionally refers to the suite of energies that carry out the procedure.
 
Secure Socket Shell (SSH), is a network protocol that provides administrators complete security to access a remote access for a system. SSH provides strong verification, secured encrypted data communications connecting over an insecure network such as the Internet. SSH is broadly used by system managers for handling them globally & grant them access to log in to another system network, execute commands and transfer files from one system to another.
 
SSH is also known as Secure Socket Shell which provides strong authentication and secure encrypted data communications between two computers connecting over an insecure network such as the Internet.
 
Back
Top