{"id":4527,"date":"2018-01-08T11:22:04","date_gmt":"2018-01-08T11:22:04","guid":{"rendered":"http:\/\/www.scmgalaxy.com\/tutorials\/?p=4527"},"modified":"2018-01-08T11:22:04","modified_gmt":"2018-01-08T11:22:04","slug":"what-is-sshsecure-shell","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-sshsecure-shell\/","title":{"rendered":"What is SSH(Secure Shell)"},"content":{"rendered":"<p><strong>SSH Secure Shell provides\u00a0<\/strong>users with a secure, encrypted mechanism to log into systems and transfer files; it can be viewed as a secure replacement for FTP.<\/p>\n<p>Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a network, to execute commands in a remote\u00a0 machine, and to move files from one machine to another. It provides strong authentication\u00a0 and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.<\/p>\n<p>SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network<br \/>\ncan only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.<\/p>\n<p>When using ssh&#8217;s slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SSH Secure Shell provides\u00a0users with a secure, encrypted mechanism to log into systems and transfer files; it can be viewed as a secure replacement for FTP. Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a network, to execute commands in a remote\u00a0 machine, and to move&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[2],"tags":[4441,896,4443,4442,4439,4440],"class_list":["post-4527","post","type-post","status-publish","format-standard","hentry","category-uncategorised","tag-secure-shell","tag-ssh","tag-ssh-introduction","tag-ssh-overview","tag-what-is-secure-shell","tag-what-is-ssh"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/4527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=4527"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/4527\/revisions"}],"predecessor-version":[{"id":4528,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/4527\/revisions\/4528"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=4527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=4527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=4527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}