Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
51 views

SSH - The Secure Shell

The document discusses ssh (Secure Shell), a program that allows users to securely log into and execute commands on remote machines. It replaces older remote login programs like rlogin and rsh with encrypted authentication and communications. SSH provides remote login and command execution capabilities while ensuring authentication of users and encrypting data transmitted over insecure channels. The document covers the basic syntax and functions of ssh, how encryption and decryption work, advantages like security across platforms, and disadvantages like potential performance issues on older machines. It concludes that ssh offers a simple yet secure way for remote access and communication.

Uploaded by

Titto Thomas
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

SSH - The Secure Shell

The document discusses ssh (Secure Shell), a program that allows users to securely log into and execute commands on remote machines. It replaces older remote login programs like rlogin and rsh with encrypted authentication and communications. SSH provides remote login and command execution capabilities while ensuring authentication of users and encrypting data transmitted over insecure channels. The document covers the basic syntax and functions of ssh, how encryption and decryption work, advantages like security across platforms, and disadvantages like potential performance issues on older machines. It concludes that ssh offers a simple yet secure way for remote access and communication.

Uploaded by

Titto Thomas
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 11

ssh – The Secure Shell

Presentation by Titto Thomas


Student id:6636942
ssh stated mission
“ssh is a program for logging into a remote
machine and for executing commands in a
remote machine. It is intended to replace
rlogin and rsh, and provide secure
encrypted communications between two
untrusted hosts over an insecure channel.”
Secure Shell’s Functions
 Explicit functionalites
 Remote login tool
 Remote command executor
 Implicit activites
 Authentication
 Encryption
ssh syntax
 Logging in
ssh –l remote-user-name remote-machine-id
e.g., ssh -l root 193.6.37.12
 Executing a command
ssh –l remote-user-name remote-machine-id
command
e.g., ssh -l root 193.6.37.12 cat /etc/passwd
Cryptography…
Encryption Procedure…
Decryption Procedure…
ADVANTAGES:
 Proven technology
 Strong international encryption
 SSH client runs of most platforms, the server
runs on UNIX and Linux
DISADVANTAGES:
• Cannot restrict what ports may or may not be
forwarded, per user.
•Performance can be a problem on old
machines
CONCLUSION:
 SSH can provide local and remote users with a
high-level of security with a simple and small
drop-in application

 Java was chosen because of its cross-platform


compatibility.

 The use of secure communication is for users to


encourage their company, financial institutions,
health care providers, and other businesses to
offer secure services.
REFERENCES:-
 homepage.smc.edu/morgan_david/linux/a07-ssh.pdf

 www.hit.bme.hu/~buttyan/courses/Revkomarom/ssh.pdf

 http://tldp.org/HOWTO/MindTerm-SSH
Questions…?
!!!!!!!!!!!!!!!!!!!!

You might also like