Ace school

with brainly

  • Get help from millions of students
  • Learn from experts with step-by-step explanations
  • Level-up by helping others

A community for students.

What is SSH?

Computer Science
See more answers at brainly.com
At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat.

Join Brainly to access

this expert answer

SEE EXPERT ANSWER

To see the expert answer you'll need to create a free account at Brainly

I believe it's a way to remotely access a server/pc and run commands
That's right, here's wikipedia for more info: http://en.wikipedia.org/wiki/Secure_Shell
better version of telenet

Not the answer you are looking for?

Search for more explanations.

Ask your own question

Other answers:

Actually, it's a secure version of rsh (Remote SHell). As you get farther into Unix, you'll hear about "r" commands and "s" commands. The r-commands are remote copy (rcp), remote shell (rsh), remote login (rlogin). Great commands, except that they're clear text, so your passwd is exposed. The "s" commands are secure replacements for the "r" commands, encrypting all the communications.
Right. SSH requires users and machines to have public and private encryption keys. In order to jump from one machine to another, a key must (1) be listed as an acceptable key on the remote machine and (2) a password must be entered. On successful validation, you'll have an encrypted connection between both machines. This is a major improvement over rsh for a number of reasons--prevents a man-in-the-middle attack, spoofing a machine's identity, etc.--and is now the de facto standard.

Not the answer you are looking for?

Search for more explanations.

Ask your own question