Skip to content

About SSH

Jeremy Jones has a tutorial about Mastering SSH, the secure shell which is a means to access one computer from another on a network.

His first issue is about the security registration process that occurs on the first connect to a remote machine. If not expected, this response to a connect attempt may cause concern.

The connection and login example shows that the user name is assumed to be the local login name. He does not mention this or how it can be over-ridden before he goes on to authorized keys and the use of a public/private key pair to make things easier and more secure.

To login with user, try ‘ssh user@hostname’. This is detailed in the manual (man ssh). With the proper authorized keys setup, you can use SSH to execute commands on a remote machine via shell script. That opens up a lot of possibilities for network systems management.

Post a Comment

You must be logged in to post a comment.