About 176,000 results
Open links in new tab
  1. Secure Shell - Wikipedia

    The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. [1] . Its most notable applications are remote login and …

  2. What is SSH (Secure Shell)?

    SSH is a software package that enables secure system administration and file transfers over insecure networks. It is used in nearly every data center and in every large enterprise.

  3. What is SSH? | Secure Shell (SSH) protocol - Cloudflare

    The Secure Shell (SSH) protocol sets up encrypted connections for remote logins and file transfers between computers. SSH also enables tunneling. Learn how SSH works.

  4. A Beginner’s Guide to SSH: What It Is and How to Use It

    Sep 11, 2024 · SSH stands for Secure Shell, and it’s a protocol that allows you to connect to a remote computer securely over an unsecured network. SSH provides a secure channel between two …

  5. What is SSH (Secure Shell) and How Does It Work? - TechTarget

    Jul 29, 2024 · SSH (Secure Shell or Secure Socket Shell) is a network protocol that gives users -- particularly systems administrators -- a secure way to access a computer over an unsecured …

  6. SSH Command in Linux - GeeksforGeeks

    Nov 19, 2025 · SSH (Secure Shell) is a secure communication protocol that allows a user to access and control a remote computer over a network. Unlike older protocols like Telnet or Rlogin, SSH encrypts …

  7. SSH Tutorial: What is SSH, Encryptions and Ports - Hostinger

    Sep 8, 2025 · What is SSH? SSH, or Secure Shell Protocol, is a remote administration protocol that allows users to access, control, and modify their remote servers over the internet.

  8. SSH Fundamentals - Linux Handbook

    Aug 18, 2025 · Learn how to communicate between a remote Linux server and your local operating systems (Windows, Linux or macOS) using SSH.

  9. What Is SSH: Secure Shell Explained | phoenixNAP KB

    Aug 14, 2024 · SSH can use various authentication methods to verify the client's identity and establish a secure connection with the server. These include public keys, passwords, host keys, and even …

  10. SSH Explained – What It Is & Why It Matters for Security

    May 19, 2025 · SSH (Secure Shell) is a protocol used to securely connect to remote machines over a network. It encrypts all communication, ensuring that your commands, data, and login credentials are …