From the course: Linux Tips

Unlock this course with a free trial

Join today to access over 22,400 courses taught by industry experts.

SSH: Secure access

SSH: Secure access - Linux Tutorial

From the course: Linux Tips

SSH: Secure access

- [Instructor] When we log in to a Linux machine locally, we're using the console, a local text interface that can present a text or graphical shell. But in a connected world where servers live in your data center or in other people's data centers, we often need to log in remotely, rather than by sitting down at a keyboard in front of the machine we need to use. In order to make the connection securely, we use a protocol called SSH or Secure Shell. Support for this protocol needs to be installed on the remote machine, though usually systems configure to servers and have the software preinstalled. Open SSH is a commonly used package, though there are others. SSH sets up an encrypted connection between the remote computer and a user's local computer. Within this connection, a shell program operates just as it does when you're logged in locally at a console. You can type commands and see the results. The SSH protocol also provides support for transferring files securely, using the SFTP…

Contents