What is SSH Access?

Instructor: David Delony

David is a freelance writer specializing in technology. He holds a BA in communication.

Learn what SSH is, the differences in security between SSH and Telnet, and how to access SSH on popular computing platforms. You'll learn why SSH is the preferred way to access computers remotely instead of Telnet.

What Is SSH?

Have you ever wished you could access a computer in another place as easily as you could while you were sitting right at the keyboard? With SSH, you can manage servers across the room, across the hall and even across the world with the right software.

SSH stands for Secure Shell. You might have used a shell on Linux, Mac or Windows to directly control the computer, but SSH lets you run commands from other computers. This is especially useful for people managing remote servers, whether in a local data center or in another site.

For example, a system administrator might want to change the configuration of a cloud server's operating system in another city. With SSH, she can log in to her computer from anywhere, even from home, without having to physically be at the machine.

SSH was created by Tatu Ylonen at the Helsinki University of Technology in 1995 as an alternative to the existing Telnet application, which also offers remote access. Yonen developed SSH after a hacker broke into a computer remotely via Telnet. Ylonen founded a company called SSH Communications to develop SSH, but the most common version in existence is an open source variant called OpenSSH, developed by the OpenBSD team. OpenBSD is an operating system known for its high security.

If you use Mac OS or Linux, you already have SSH on your system. If you use Windows, you can download an application called PuTTY to install SSH on your machine.

Why SSH?

SSH aims to make remote connections to computers much more secure than using Telnet.

SSH does this by encrypting, or scrambling, the connection between your computer and the remote computer. With a Telnet connection, if a hacker manages to intercept the connection, it will be possible to read everything sent between the computers. This includes usernames and passwords. The hacker will then be able to get into the machine and see everything on it. This could be a website, a database, even credit card information.

While in most cases you'll only be able to access text applications over the command line, on Unix/Linux systems, it's also possible to access graphical applications remotely with the right settings, though this is slower than using them directly on the desktop. For example, a college computer lab could share a copy of a graphical scientific program running on a central server, such as Mathematica, using a site license.

The ability for system administrators to remotely log in and make changes to the operating system and applications, such as databases and web servers, makes SSH a very valuable tool for anyone in IT.


With SSH, a hacker will only see gibberish over the connection, which keeps important data safe.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it now
Create an account to start this course today
Used by over 30 million students worldwide
Create an account