Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Secure Shell, or SSH,
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=69901]



Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions[clarification needed] on remote machines in a secure way.
This allows a user to run commands on a machine's command prompt without them being physically present near the machine. It also allows a user to establish a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server

SSH was designed as a replacement for Telnet and other insecure remote shell protocols which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.[2] The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet
File transfer protocols using SSH
There are multiple mechanisms for transferring files using the Secure Shell protocols.
Secure copy (SCP), which evolved from RCP protocol over SSH
rsync, intended to be more efficient than SCP
SSH File Transfer Protocol (SFTP), a secure alternative to FTP (not to be confused with FTP over SSH)
Files transferred over shell protocol (a.k.a. FISH), released in 1998, which evolved from Unix shell commands over SSH
ssh sheena[at]192.168.0.11 mkdir -p .ssh
cat .ssh/id_rsa.pub | ssh sheena[at]192.168.0.11 'cat >> .ssh/authorized_keys'
ssh sheena[at]192.168.0.11 "chmod 700 .ssh; chmod 640 .ssh/authorized_keys"