Your client encrypts information to the server using the servers public key and the server encrypts information sent to you using your public key. For the latter to work, a small public key is given to the server and the server gives your client its public key. SSH operates just as telnet with a user/password combination or on a Public/Private key infastructure. Unless changed, everything SSH operates on port 22. It can also be used for creating secure tunnels, somewhat akin to Virtual Private Networks, and for use as a network file system ( Sshfs). SSH, or Secure Shell, is an encrypted protocol and associated program intended to replace telnet.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |