# What is SSH?

##### <span style="color: rgb(0, 0, 0);">**Introduction**</span>

<span style="color: rgb(0, 0, 0);">SSH (Secure Shell) is a cryptographic network protocol that enables secure communication between computers over a potentially unsecured network, like the internet. It is primarily used to remotely access and manage servers, devices, and systems. (ง ื▿ ื)ว</span>

##### <span style="color: rgb(0, 0, 0);">**Capabilities of SSH:**</span>

- <span style="color: rgb(0, 0, 0);">**Encrypted Communication**: SSH ensures that data sent between the client (your computer) and the server is encrypted, which protects it from eavesdropping, tampering, or unauthorized access.</span>
- <span style="color: rgb(0, 0, 0);">**Authentication**: SSH uses key-based or password-based authentication to verify the identity of the client and server before establishing a connection. The most secure form is public-key authentication, where a private key on the client is matched with a public key stored on the server.</span>
- <span style="color: rgb(0, 0, 0);">**Command Execution**: SSH allows users to execute commands remotely on a server. For example, you can manage files, install software, or configure system settings as if you were physically at the server, all through the command line.</span>

<span style="color: rgb(0, 0, 0);">*Last Updated: 2/20/2025  
BY: Lilian*</span>