anonymous
  • anonymous
What is SSH?
Computer Science
  • Stacey Warren - Expert brainly.com
Hey! We 've verified this expert answer for you, click below to unlock the details :)
SOLVED
At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat.
schrodinger
  • schrodinger
I got my questions answered at brainly.com in under 10 minutes. Go to brainly.com now for free help!
anonymous
  • anonymous
I believe it's a way to remotely access a server/pc and run commands
anonymous
  • anonymous
That's right, here's wikipedia for more info: http://en.wikipedia.org/wiki/Secure_Shell
anonymous
  • anonymous
better version of telenet

Looking for something else?

Not the answer you are looking for? Search for more explanations.

More answers

rsmith6559
  • rsmith6559
Actually, it's a secure version of rsh (Remote SHell). As you get farther into Unix, you'll hear about "r" commands and "s" commands. The r-commands are remote copy (rcp), remote shell (rsh), remote login (rlogin). Great commands, except that they're clear text, so your passwd is exposed. The "s" commands are secure replacements for the "r" commands, encrypting all the communications.
anonymous
  • anonymous
Right. SSH requires users and machines to have public and private encryption keys. In order to jump from one machine to another, a key must (1) be listed as an acceptable key on the remote machine and (2) a password must be entered. On successful validation, you'll have an encrypted connection between both machines. This is a major improvement over rsh for a number of reasons--prevents a man-in-the-middle attack, spoofing a machine's identity, etc.--and is now the de facto standard.

Looking for something else?

Not the answer you are looking for? Search for more explanations.