Using ssh

If you understand the concepts revolving around telnet and how to use it, then you will have absolutely no problem understanding secure shell, commonly referred to as ssh and invoked with the ssh command. Secure shell is primarily used to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another just as you would with telnet. The difference is, ssh does it securely.

There are serious flaws in the telnet program as it is based on the telnet protocol, which is part of the TCP/IP protocol suite. Without getting too involved with what the suite is, remember that you had an IP address before that you needed to connect to a remote system. Well, IP is a protocol and it ...

Get SAMS Teach Yourself Unix in 10 Minutes now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.