0% found this document useful (0 votes)
22 views6 pages

Secure Shell Protocol

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1/ 6

SECURE SHELL

PROTOCOL
SSH Protocol
The Secure Shell (SSH) in Linux is used to log
into the machine in an encrypted and safe
manner. It is a secure alternative to the non-
protected login protocols (such as telnet,
rlogin) and insecure file transfer methods
(such as FTP).

On Windows, the most common tool to


perform a secure shell to a Linux server is
putty.
USES OF THE SSH PROTOCOL
providing secure access for users and
automated processes
interactive and automated file transfers
issuing remote commands
managing network infrastructure and other
mission-critical system components.
Install SSH
sudo apt-get install openssh-server
How to Use SSH to Login to a
Remote Computer
In order to access a remote computer, you'll
need to have an account on that machine.
When OpenSSH is installed and your user
created, login to the remote computer with this
command:
ssh username@hostname
Username is the name of the user you created
and hostname is the name of the computer (or
host) or its IP address. So if you had a
computer at home with an account called
scms, from the command line you would
Copying Files using SSH
The secure copy command (scp) allows you to
securely copy files to and from the remote box. The
syntax is as follows:
scp filename.extension remoteuser@remotebox:/directory
Use -r for directories
scp -r /local/directory remoteuser@remotebox:/remote/directory

You might also like