![]() It stores a public key in the remote system and private key in the client system. It uses encryption standards to securely connect and login to the remote system. The ssh or secure shell is a network protocol for operating networking services securely over a network. ![]() But running them depends on the permissions allotted to a remote user as with any Linux/UNIX system. Note that most of the commands that you run on your personal local Linux system should be available on the remote system also (such as ls, cat, cd command etc). In this article, I will cover some useful commands and tools a Linux user must know to use a remote system and its resources over ssh. On the other hand, ssh is the popular means of securil connecting to remote systems. Telnet is not preferred due to security concerns. ![]() There are many protocols and tools which are developed for this purpose. ![]() Your server can be anywhere in the world and you can connect to it from your local machine. Thanks to the connected world we live in, you don’t need to have physical access to your server anymore. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |