Let me tell you about SSH..
Firstly.. i'm not telling you to hush in a polite form..lol
SSH in tech means Secure Shell Protocol.. it's ah mouthful eh!
So let's get into it.. SSH is a remote administration protocol which allows computers to talk to each other. Yeah I’d be a bit confused too, if this was my first time ever hearing about this.
Your pc has “administrator rights” or maybe it's you, the person that makes all the changes to the computer internally, whether by changing network settings or firewall settings, it's all the same here. When you have that “title or rank” you can use SSH to control and modify your pc remotely.
It's used mostly to connect a remote host to the terminal, in various ways. You’d use a command in the terminal; something like this “ssh username@host_ip_address.com” usually there’s numbers in there.. but you get it.
Going in depth, when this happens, a connection to the server is made using the username, and may require you to input the public key fingerprint, even if there was never a connection before.
This appears and as soon as you hit “yes” babyyyy you’re as good as gold to go!
Looks easy right? But there’s some heavy technical stuff I didn’t get into involving keys being hidden in directories, and stored in known_hostfiles etc. Also you should know there’s a lot of cryptography and encryption going on here as well, (Asymmetrical, Symmetrical and Hashing) too.
Network Administrators use SSH to transfer secure files, manage network infrastructures and make necessary changes to the device. Like all good things, there's also the bad that comes with it and using SSH is no stranger to hackers, it’s in fact one of the most used protocols. Hackers can SSH into your device using brute force attacks and cause so much damage. SSH keys can be used to store backups and other pertinent information as well.
SSH uses both TCP & UDP on port 22 but more commonly runs over TCP. There’s also something called SSH tunneling, where if you are using a VNC (Virtual Network Computing) you can totally encrypt connections using SSH tunneling, but we’ll circle back to this in another blog post later on.
That’s all for now on SSH.. thanks for stopping by and hope to see you again soon.
Love, Light & RDP