The secure shell (SSH) is now the de facto standard for remote logins to other machines. It replaces old, insecure programs like
rlogin. In addition to being a good example of a stand-alone server (for the purposes of this book, at least), SSH has these features:
Encrypts your password and all other session data, protecting you from snoopers.
Tunnels other network connections, including those from X Window System clients. Tunneling is the process of packaging and transporting a network connection using another network connection. The advantages of using SSH to tunnel X Window System connections are that SSH sets up the display environment for you and encrypts the X data inside the tunnel.
Has clients for almost every ...