Date First Published: 18th March 2022
Topic: Computer Networking
Subtopic: Internet Protocols
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 6/10
Learn more about what SSH is in this article.
Short for Secure Shell, SSH is an application-layer protocol used as a secure method of communicating with a server or remote device. It works in a similar way to Telnet, since it uses a command-line interface rather than a graphical-user interface with windows, icons, and menus, and enables a remote connection to another device.
SSH is much more secure than Telnet because it uses public-key encryption to encrypt messages into ciphertext (encrypted text). If an attacker tried to intercept the sent information, such as the credentials, they would only see random text, which is unreadable by humans. The encryption works by using highly complex mathematical formulas to scramble the sent information in order for it to not be read by anyone else. SSH was designed to replace the insecure protocol, Telnet, and as of now, it is highly recommended to use SSH rather than Telnet for security reasons.
In SSH, the word ‘Shell’ means that SSH is based on Unix shell, a program used for understanding and running the commands that are typed by a user. SSH uses port 22 by default. Originally, SSH was created as a Unix-based command, but it is also supported on the Windows operating system.
SSH is most commonly used by network administrators and developers who need to use specific applications hosted on a server or remote device. Functions, such as logging into another computer over a network remotely, running commands, securely managing network infrastructure components, and transferring files from one computer to another through the use of FTP can be performed by SSH. In addition, SSH can be used in scripts and other software for enabling programs and systems to remotely access data in a secure way. SSH is difficult to use for inexperienced users or users who are unfamiliar with Unix commands to use because it requires knowledge of these.
SSH can be accessed by typing ‘ssh’ and an IP address or domain name on a terminal or SSH client, such as:
Once a user has successfully connected to the host, they will be asked for their password. In addition, a custom port can be specified by typing this command:
By default, SSH uses port 22 and in most cases, it is unnecessary for a custom port to be specified.
A lot of SSH commands exist, including:
TCP/IP Protocol | Application layer | BGP• DHCP • DNS • FTP • HTTP • IMAP • LDAP • MGCP • NNTP • NTP • OSPF • POP • PTP • ONC/RPC • RTP • RTSP • RIP • SIP • SMTP • SNMP • SSH • Telnet • XMPP | Transport layer | TCP • UDP • DCCP • SCTP • RSVP • QUIC | Internet layer | IP • ICMP • NDP • ECN • IGMP. | Link layer | Tunnels • PPP • MAC |
---|
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection