David is a freelance writer specializing in technology. He holds a BA in communication.
What is SSH Access?
What Is SSH?
Have you ever wished you could access a computer in another place as easily as you could while you were sitting right at the keyboard? With SSH, you can manage servers across the room, across the hall and even across the world with the right software.
SSH stands for Secure Shell. You might have used a shell on Linux, Mac or Windows to directly control the computer, but SSH lets you run commands from other computers. This is especially useful for people managing remote servers, whether in a local data center or in another site.
For example, a system administrator might want to change the configuration of a cloud server's operating system in another city. With SSH, she can log in to her computer from anywhere, even from home, without having to physically be at the machine.
SSH was created by Tatu Ylonen at the Helsinki University of Technology in 1995 as an alternative to the existing Telnet application, which also offers remote access. Yonen developed SSH after a hacker broke into a computer remotely via Telnet. Ylonen founded a company called SSH Communications to develop SSH, but the most common version in existence is an open source variant called OpenSSH, developed by the OpenBSD team. OpenBSD is an operating system known for its high security.
If you use Mac OS or Linux, you already have SSH on your system. If you use Windows, you can download an application called PuTTY to install SSH on your machine.
Why SSH?
SSH aims to make remote connections to computers much more secure than using Telnet.
SSH does this by encrypting, or scrambling, the connection between your computer and the remote computer. With a Telnet connection, if a hacker manages to intercept the connection, it will be possible to read everything sent between the computers. This includes usernames and passwords. The hacker will then be able to get into the machine and see everything on it. This could be a website, a database, even credit card information.
While in most cases you'll only be able to access text applications over the command line, on Unix/Linux systems, it's also possible to access graphical applications remotely with the right settings, though this is slower than using them directly on the desktop. For example, a college computer lab could share a copy of a graphical scientific program running on a central server, such as Mathematica, using a site license.
The ability for system administrators to remotely log in and make changes to the operating system and applications, such as databases and web servers, makes SSH a very valuable tool for anyone in IT.
Security
With SSH, a hacker will only see gibberish over the connection, which keeps important data safe.
SSH has other methods beside encryption of keeping data safe. It usually prohibits users from logging in as root. On Unix and Linux systems, root, or superuser, has access to every file and setting on the system. If a hacker got a hold of this account, he or she could lock other administrators out, delete files or steal information. It's, therefore, very important to keep this account secure and limit access as much as possible.
SSH also allows users to access the computer using public key authentication. With public key cryptography, if a private key matches a public key known to the system, the user is granted access. This offers even more security by making sure that authorized users are who they say they are and not hackers who are stealing or guessing passwords. It's even possible with public key to log in without a password at all.
A user who doesn't want to remember a password can upload a public key into a certain place in the home directory and will be able to log in without a password. A user who wants more security will still want to use a password. It's also possible to use a longer, more complex password known as a passphrase for extra security.
Lesson Summary
SSH, or Secure Shell, makes it very easy to access remote servers while keeping them safe from hackers. SSH uses encryption to keep the connection between a user and a remote computer secure. It also uses public key encryption to add even more security while giving the option to eliminate passwords entirely.
To unlock this lesson you must be a Study.com Member.
Create your account
Register to view this lesson
Unlock Your Education
See for yourself why 30 million people use Study.com
Become a Study.com member and start learning now.
Become a MemberAlready a member? Log In
BackWhat is SSH Access?
Related Study Materials
- Biology 202L: Anatomy & Physiology II with Lab
- Biology 201L: Anatomy & Physiology I with Lab
- California Sexual Harassment Refresher Course: Supervisors
- California Sexual Harassment Refresher Course: Employees
- Sociology 110: Cultural Studies & Diversity in the U.S.
- Patterns of Human Migration
- Overview of Blood & the Cardiovascular System
- Electrolyte, Water & pH Balance in the Body
- Sexual Reproduction & the Reproductive System
- Nutrition & Metabolism in the Human Body
- How Teachers Can Improve a Student's Hybrid Learning Experience
- How Long is the School Day in Homeschool Programs?
- Types of Hybrid Learning Models During Covid-19
- Creating Routines & Schedules for Your Child's Pandemic Learning Experience
- How to Make the Hybrid Learning Model Effective for Your Child
- What Are Online Homeschools?
- Distance Learning Considerations for English Language Learner (ELL) Students
Latest Courses
- Uncle Vanya by Chekhov: Summary & Characters
- Raccoon Adaptations: Lesson for Kids
- Esperanza Rising Timeline
- Azar in The Things They Carried
- Claim of Right Doctrine, Tax Benefit Rule & Recovery of Capital Doctrine
- Symbols of Redemption in The Kite Runner
- Facilitating Resolution of Ethical Conflicts in Complex Care Situations
- Quiz & Worksheet - Bronze Age Dress
- Quiz & Worksheet - Vanka by Chekhov Synopsis & Analysis
- Quiz & Worksheet - Dr. Jekyll & Mr. Hyde Animal Quotes
- Quiz & Worksheet - Roman Furniture
- Flashcards - Real Estate Marketing Basics
- Flashcards - Promotional Marketing in Real Estate
- Grammar Worksheets & Practice
- NGSS | Next Generation Science Standards Guide for Teachers
Latest Lessons
- Nutritional Science for Teachers: Professional Development
- High School Geometry: Help and Review
- Psychotherapy Approaches: Help & Review
- Holt McDougal Algebra 2: Online Textbook Help
- SAT Subject Test Mathematics Level 2: Practice and Study Guide
- Respiratory System: Help and Review
- Competitive Advantage: Help and Review
- Quiz & Worksheet - Learning-Focused Methods for Teachers
- Quiz & Worksheet - How to Build Community in the Classroom
- Quiz & Worksheet - English Bill of Rights
- Quiz & Worksheet - Crystallized Intelligence
- Quiz & Worksheet - Promoting Literacy in the Classroom
Popular Courses
- Strategies for Teaching ELL Students
- Deductive Outlines for Good & Neutral Messages
- TABE Test Locations
- AP Biology Exam Date
- How to Choose a Dissertation Topic
- USMLE Step 3 Registration
- AP English Literature Test & Study Guide
- Creative Writing Prompts for Middle School
- What is the PSAT 8/9? - Information, Structure & Scoring
- Best MCAT Prep Books
- What is the ELM Test?
- Praxis Spanish Test Dates
Popular Lessons
Math
Social Sciences
Science
Business
Humanities
Education
History
Art and Design
Tech and Engineering
- Tech and Engineering - Videos
- Tech and Engineering - Quizzes
- Tech and Engineering - Questions & Answers