The document discusses ssh (Secure Shell), a program that allows users to securely log into and execute commands on remote machines. It replaces older remote login programs like rlogin and rsh with encrypted authentication and communications. SSH provides remote login and command execution capabilities while ensuring authentication of users and encrypting data transmitted over insecure channels. The document covers the basic syntax and functions of ssh, how encryption and decryption work, advantages like security across platforms, and disadvantages like potential performance issues on older machines. It concludes that ssh offers a simple yet secure way for remote access and communication.
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
51 views
SSH - The Secure Shell
The document discusses ssh (Secure Shell), a program that allows users to securely log into and execute commands on remote machines. It replaces older remote login programs like rlogin and rsh with encrypted authentication and communications. SSH provides remote login and command execution capabilities while ensuring authentication of users and encrypting data transmitted over insecure channels. The document covers the basic syntax and functions of ssh, how encryption and decryption work, advantages like security across platforms, and disadvantages like potential performance issues on older machines. It concludes that ssh offers a simple yet secure way for remote access and communication.
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 11
ssh – The Secure Shell
Presentation by Titto Thomas
Student id:6636942 ssh stated mission “ssh is a program for logging into a remote machine and for executing commands in a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure channel.” Secure Shell’s Functions Explicit functionalites Remote login tool Remote command executor Implicit activites Authentication Encryption ssh syntax Logging in ssh –l remote-user-name remote-machine-id e.g., ssh -l root 193.6.37.12 Executing a command ssh –l remote-user-name remote-machine-id command e.g., ssh -l root 193.6.37.12 cat /etc/passwd Cryptography… Encryption Procedure… Decryption Procedure… ADVANTAGES: Proven technology Strong international encryption SSH client runs of most platforms, the server runs on UNIX and Linux DISADVANTAGES: • Cannot restrict what ports may or may not be forwarded, per user. •Performance can be a problem on old machines CONCLUSION: SSH can provide local and remote users with a high-level of security with a simple and small drop-in application
Java was chosen because of its cross-platform
compatibility.
The use of secure communication is for users to
encourage their company, financial institutions, health care providers, and other businesses to offer secure services. REFERENCES:- homepage.smc.edu/morgan_david/linux/a07-ssh.pdf