Click here

SSH

Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.

SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.

When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.

SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication.



Top Terms
  • 1

    private cloud project

    Companies initiate private cloud projects to enable their IT infrastructure to become more capable of quickly adapting to continually evolving...

    Read more »

  • 2

    cloud backup

    A cloud backup (cloud computer backup) refers to backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is...

    Read more »

  • Click Here!

Connect with Webopedia

  • Android Apps for Remote Computer Access

    Remote access is useful when you need to collaborate with co-workers, help a friend with PC problems or grab files from your desktop.

    Read More »

Did You Know? Archive »

  • Quick Reference Archive »