Readings: Network Connectivity - zeroknightdx/Intro-to-Computer-Operations-notes GitHub Wiki
What is the Secure Shell (SSH) Protocol?
encrypted line between your device and the remote computer
What are the typical uses of the SSH protocol?
Remote Login: Accessing and controlling a remote computer, similar to logging into your own computer.
*File Transfer: Securely transferring files between your computer and a remote server.
*Running Commands: Executing commands on a remote computer as if you were directly connected to it.
How does the SSH protocol work?
Connection Establishment:
You (the client) initiate a connection to the remote computer (the server).
The server verifies your identity using a public key or password.
Encrypted Channel:
Once authenticated, an encrypted channel is established between your computer and the server.
All data transmitted over this channel is scrambled, making it unreadable to anyone who might be eavesdropping.
Secure Communication:
You can now send commands and receive output from the remote computer securely.
Any sensitive information, like passwords or file contents, is protected by encryption.
How is the data kept safe when transmitted between the SSH client and server?
SSH uses strong encryption algorithms to protect data during transmission.
What is SFTP?
SFTP (SSH File Transfer Protocol) is a file transfer protocol that uses SSH to securely transfer files between computers