SSH Secure Shell Hosting

SSH Secure Shell Hosting

SSH or Secure shell hosting is a service which let you connect your Machine remotely from anywhere even on unsecured network areas ssh provides cryptographic encryption for operating your shell and cannot be accessed remotely without proper authentication.

SSH is mainly used in Linux operation systems, not even Wireshark can read data packets on the ssh protocol SSH provides high security for authentication some major security authentications make SSH even harder to Hack.

SSH has two major types of authentication Public Key Authentication & Password Authentication these security authentications are used everywhere 

      


Public Key Authentication : 

    In this Authentication, public and private keys are generated by the user manually Public key is given to the client to connect or a public key can be used as authentication to the computer When you provide the public key to authentication systems the Public key is checked for Matchingness with the private key stored privately into the server and if the key matches then a session get spawned, this is the most secure way to secure our servers this authentication is used all over the secure companies like google Facebook etc. there are many exposed SSH services on the internet which uses this type of authentication although it is 99% impossible to gain access into the system.


Password Authentication :


    This is a very simple authentication we have to set the login password when we connect to the machine we had to type the login password in order to get access to the system. this type of authentication is used in local area networks like offices and small companies and is not exposed to the internet.

this much for now see you later on next post of how to setup SSH server and how to connect it

Comments

Popular Posts