About 1,310,000 results
Open links in new tab
  1. Secure Shell - Wikipedia

    Finnish computer scientist Tatu Ylönen designed SSH in 1995 and provided an implementation in the form of two commands, ssh and slogin, as secure replacements for rsh and rlogin, respectively.

  2. OpenSSH

    OpenSSH is the premier connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks.

  3. How to Use SSH to Connect to a Remote Server (Step-by-Step Guide)

    Jun 5, 2025 · Learn how to use SSH to securely connect to a remote server. This step-by-step guide covers setup, syntax, key auth, troubleshooting, and best practices.

  4. What is SSH (Secure Shell)? | SSH Academy

    SSH is a software package that enables secure system administration and file transfers over insecure networks. It is used in nearly every data center and in every large enterprise.

  5. How to Use SSH (with Pictures) - wikiHow

    May 17, 2025 · To use SSH, start by downloading and opening SSH if you have Windows, or simply opening it if you have a Mac or Linux system. Then, enter the command “$ ssh,” your username on …

  6. What is SSH? | Secure Shell (SSH) protocol - Cloudflare

    The Secure Shell (SSH) protocol sets up encrypted connections for remote logins and file transfers between computers. SSH also enables tunneling. Learn how SSH works.

  7. SSH Tutorial: What is SSH, Encryptions and Ports - Hostinger

    Sep 8, 2025 · What is SSH? SSH, or Secure Shell Protocol, is a remote administration protocol that allows users to access, control, and modify their remote servers over the internet.

  8. SSH Fundamentals - Linux Handbook

    Aug 18, 2025 · Learn how to communicate between a remote Linux server and your local operating systems (Windows, Linux or macOS) using SSH.

  9. SSH Command in Linux - GeeksforGeeks

    Nov 19, 2025 · SSH (Secure Shell) is a secure communication protocol that allows a user to access and control a remote computer over a network. Unlike older protocols like Telnet or Rlogin, SSH encrypts …

  10. What Is SSH: Secure Shell Explained | phoenixNAP KB

    Aug 14, 2024 · SSH can use various authentication methods to verify the client's identity and establish a secure connection with the server. These include public keys, passwords, host keys, and even …