SSH, A Secure Protocol For Managing And Accessing Remote Servers
SSH stands for Secure Shell, a secure protocol for connecting a client and a server. SSH encrypts the information on the user side (without user intervention) and sends it to the server.
So SSH is a protocol that helps you connect to your server remotely while maintaining Security.
Many cases require remote access to the server. One way to access the server remotely is to use the Telnet protocol. The Telnet protocol is inherently designed for use in private and confidential networks, so all data transmitted by this protocol is transmitted as plain text or unencrypted.
This data also includes all identity information, including the username and password used. This was a very important security vulnerability for Telnet until programmers and designers put an encryption mechanism on the same protocol to make the information encryptable and unhackable during the transfer.
The completed protocol is the SSH protocol. SSH can be called a secure version of the Telnet connection.
What is the SSH protocol?
SSH stands for Secure Shell, a secure protocol for communicating between a client and a server. Before sending information, SSH encrypts it on the user side (without user intervention) and sends it to the server. So, SSH is a protocol that helps you connect to your server remotely while maintaining security.
The SSH protocol is currently available in two versions, SSH-1 and SSH-2, on most operating systems. By default, it is possible to connect through both versions unless it is configured on the server side and in the SSH configuration File that only supports version 1 or, for example, 2. To know the SSH version after connection, you can run the following command:
$ ssh -v
In response to this code, it returns the SSH version:
OpenSSH_5.3p1, OpenSSL 1.0.0-fips 29 Mar 2010
What are the capabilities of the SSH protocol?
Indeed, having a secure connection between the server and the client provides us with many capabilities. Among the most critical capabilities of this protocol are the following:
- Authenticate users through various methods
- Create a secure tunnel for TCP/IP connections and insecure connections such as IMAP with full firewall compatibility.
- Automatic forwarding of connections
- Possibility of external verification of users with the help of Kerberos and SecureID
- Secure fFiletransfer
Access to the server via SSH in PUTTY software
PUTTY is a terminal simulator software, computer console, and File transfer software developed as free software. This program supports several protocols, including SSH, Telnet, and Rlogin.
When running the PUTTY software, you enter the IP server into the Host Name or IP address field, select port 22, and select the SSH option in the Connection Type field.

Then, a window that looks like a DOS and CMD environment will open. In this window, you must enter your username and password.
Note that the primary username for Linux servers is usually root.
To increase server security, passwords are made up of very complex letters and words that typically make it difficult for Linux users to type, especially when you do not see what character is added.
The solution to this problem is to copy and paste the password into the PUTTY DOS environment. Pasting in Linux requires just one right-click.