Wednesday, April 8, 2015

What is SSH? How to use SSH

SSH (English name: Secure Shell) is a network protocol used to establish network connections securely.



SSH works in layers on the classification model TCP / IP. SSH tools (such as OpenSSH, ...) gives users a way to establish a network connection is encrypted connection to a private channel. Further features of the tunneling tool allows transfer of traffic according to different protocols. Thus can be seen as building a network based on SSH, we will have a VPN system simple.

SSH is an interactive program between the server and the client can use strong encryption to prevent eavesdropping, theft of information on line. Using SSH is effective measures to secure data transmission from the system to other systems.

How it works by SSH

SSH often work through three steps:

Identification of host - determine the identity of the participating systems SSH session.
Encryption - set the working channel coding.
Authentication - Authentication user has access to the system. (User | pass)
1 SSH usually takes the following form:

IP (Host) | user | pass.
Example: 192.168.123.255 | admin | admin or abc.com | root | root

How to use SSH:

SSH can be applied to many things, but today I will guide you to use fake ip ssh to your machine

The advantage of using fake ip ssh to the long duration and secure than using proxy.

To use ssh you need:

1 SSH alive, looks like on.
Software used Bitvise Tunnelier SSH login. You can download a 4:40 here, or you can download the latest version of its home page.

No comments:

Post a Comment