Sei sulla pagina 1di 1

Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel

between two networked devices.Used primarily on Linux and Unix based systems to access shell
accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which
send information, notably passwords, in plaintext, leaving them open for interception.[2] The
encryption used by SSH provides confidentiality and integrity of data over an insecure network,
such as the Internet.
SSH is typically used to log into a remote machine and execute commands, but it also supports
tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated
SFTP or SCP protocols.SSH uses the client-server model. The standard TCP port 22 has been
assigned for contacting SSH servers.
Uses of SSH
• for login to a shell on a remote host (replacing Telnet and rlogin)
• for executing a single command on a remote host (replacing rsh)
• for copying files from a local server to a remote host

The SCP protocol, which runs on port 22, is similar to the BSD rcp protocol, however unlike rcp,
data is encrypted during transfer, to avoid potential packet sniffers extracting usable information
from the data packets. The protocol itself does not provide authentication and security; it relies on
the underlying protocol, SSH, to provide these features.
SCP can interactively request any passwords or passphrases required to make a connection to a
remote host, unlike rcp which fails in this situation.
The SCP protocol implements file transfers only. It does so by connecting to the host using SSH and
there executes an SCP server (scp). The SCP server program is typically the same program as the
SCP client.
Copying file to host:
scp SourceFile user@host:directory/TargetFile

Copying file from host:


scp user@host:directory/SourceFile TargetFile

File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files
over an Internet Protocol computer network, such as the Internet. FTP is built on a client-server
architecture and utilizes separate control and data connections between the client and server
applications. Client applications were originally interactive command-line tools with a standardized
command syntax, but graphical user interfaces have been developed for all desktop operating
systems in use today. FTP is also often used as an application component to automatically transfer
files for program internal functions. FTP can be used with user-based password authentication or
with anonymous user access. FTP runs over the Transmission Control Protocol (TCP).Usually FTP
servers listen on the well-known port number 21 (IANA-reserved) for incoming connections from
clients .PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.
These protocols are all used to run a remote session on a computer, over a network. PuTTY
implements the client end of that session: the end at which the session is displayed, rather than the
end at which it runs.

Potrebbero piacerti anche