SSH stands for Secure Shell, a program which is used to provide strong authentication and secure communication over channels which may not be secure. The program can be used to replace less secure programs such as rlogin, rcp, and can even be used to encrypt X11 traffic or other TCP traffic. The version of SSH we will cover is version 1. SSH version 2 is newer but isn't completely compatible with the older and more prevalent first version.
SSH can help you feel more confident about the security of your connections both locally and across the internet. There are several things that attackers can do to infiltrate your communications.
SSH uses public/private key pairs to authenticate machines across the network. The public key is used to encrypt the data and the private key is used to decrypt on the other end. This allows you to distribute your public key to machines or situations that you may not be in full control of. The public key is the key that is stored on remote hosts and it allows the remote host to verify that you are who you say you are. You should create an authentication key for yourself with the ssh-keygen program. This will prompt you for a passphrase and generate public and private keysets. As with all passwords your phrase should not be something that is in any dictionary in any language. If you have already generated a passphrase and decide you need to change it, (maybe you decide that "password" wasn't secure enough.) You can use the ssh-keygen command with the -p option to change it to something a little more secure (like "1kjdihwerepotiwet0".) By placing your public keys on remote machines you may access them via your private key instead of the normal password for that system. When used in conjunction with ssh-agent, a program that lets you enter your ssh passphrase and keeps your key available in memory while you are logged in, you can use a single passphrase to access a number of different hosts. It will also allow you to perform such tasks as scp (secure copy) without having to type in a password everytime you try and copy from or to a remote machine. Once you have authenticated the public and private keys are used to create and change the key used for the data encryption between the two machines
To use SSH to connect to our system, please download PuTTY From http://www.chiark.greenend.org.uk/~sgtatham/putty/latest/putty.exe Point it to your domain or IP, click the SSH box, and you're off!
SSH is acually the secured verion of telnet. This means that all passwords that pass though to the server are secured.
Go to your control panel and select Shell Session and download the program called putty.exe
Categories: 28 | Questions: 909
Categories: 30 | Questions: 183