What is it
telnet was a set of protocols for one xomputer to control another. This was not secure
Telnet then spawned secure shell (SSH). This encytped
The computer to be controlled needs to be running an SSH server.
To connect to and control the device with the server we need to install SSH software on the device we will use to connect
to login: ssh username@ip-address then enter password
Where is it used.
While users access a server by TLS or HTTP(S), admins access a server using SSH via the command line.
It can also be used for automated operations. Usually this will also invole file transfer using SCP for SFTP
0 juyt