Applications of SSH
From Computing and Software Wiki
Line 5: | Line 5: | ||
==File Transfer Using SCP== | ==File Transfer Using SCP== | ||
- | # Download and install WinSCP from [http://winscp.net/eng/index.php here].[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]{|align="right"|[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]|} | + | # Download and install WinSCP from [http://winscp.net/eng/index.php here]. |
+ | {|align="right" | ||
+ | [[Image:Winscpnew.png|right|thumb|WinSCP New Screen]] | ||
+ | |} | ||
+ | {|align="right" | ||
+ | |[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]] | ||
+ | |} | ||
# Start the program and click "New" | # Start the program and click "New" | ||
# Enter the host, user name and password as well as the type of protocol (SCP in this case). | # Enter the host, user name and password as well as the type of protocol (SCP in this case). |
Revision as of 12:05, 13 April 2008
SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.
Contents |
Secure Shell
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command "ssh hostname" will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type "ssh username@hostname" to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host.
File Transfer Using SCP
- Download and install WinSCP from here.
- Start the program and click "New"
- Enter the host, user name and password as well as the type of protocol (SCP in this case).
- To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.
- The pane on the left is the local computer and the pane on the right is the remote computer.
- To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.
Note: The default interface is the "Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options > Preferences > Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.
SSH Tunneling
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
- One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to
Remote Backup/Restore
X11 Forwarding
See Also
- Some other stuff
References
- Some references