Ch.6 Linux Network
Ch.6 Linux Network
Alpha University
Faculty of IT and Cyber security
Borama, Somaliland
Chapter 6
For demonstration purpose, we will connect to your computer (localhost). The utility
will ask your username and password.
SSH
• SSH which stands for Secure Shell, It is used to connect to
a remote computer securely. Compare to Telnet, SSH is
secure where in the client /server connection is
authenticated using a digital certificate and passwords are
encrypted. Hence it's widely used by system
administrators to control remote Linux servers.
Cont..
• Why SSH is used?
SSH is typically used to log into a remote machine and execute commands,
but it also supports tunneling, forwarding TCP ports and X11 connections;
it can transfer files using the associated SSH file transfer (SFTP) or secur
copy (SCP) protocols.SSH uses the client-server model.
By using SSH you are able to move freely through your hosting account file
structure. You can also perform tasks such as live monitoring log files and
starting and stopping services (for VPS and Dedicated customers only).
You can even use it to install software to your account or manage your
MySQL databases.
The syntax to log into a remote Linux machine using SSH is
KEY DIFFERENCES:
• Telnet is the standard TCP/IP protocol for virtual terminal
service, while SSH or Secure Shell is a program to log into
another computer over a network to execute commands in a
remote machine.
• Telnet is vulnerable to security attacks while SSH helps you to
overcome many security issues of Telnet .
• Telnet uses port 23, which was designed specifically for local
area networks, whereas SSH runs on port 22 by default.
• Telnet transfers the data in plain text while in SSH data is sent
in encrypted format via a secure channel.
• Telnet is suitable for private networks. On the other hand,
SSH is suitable for public networks.
Important Telnet Commands