Till now i now that ssh is like encryption in the network .But i want to be clear what it is and why we use it . And why to access it for remote guest OS . please give one example also.
Till now i now that ssh is like encryption in the network .But i want to be clear what it is and why we use it . And why to access it for remote guest OS . please give one example also.
Using SSH to login to remote machine's is considered very secure as all communication between client and server is encrypted with public and private key encryption. As well as that the client and server will also use a digital signature to identify the each other, this can warn when the identity if the server or client suddenly changes.
For example, if there is a man in the middle attack, you will see something like this and connection is terminated immediately:
This could show when someone intercept the data packet sent from the server and replaced with one of his own.
Even if the man in the middle attack did happned, they will still not be able to read the data as the data being encrypted with your public key and it needs your private key to decrypt the data. So data pretty useless.
Although, no system is perfect and it is possible to spoof a connection between machines, but this measures can slow someone down.
Its consider a best practice not allow any user to SSH in as
root
user. Instead, as a standard user(in thesudo
group) and becomesudo
.CentOS answer https://www.centos.org/docs/5/html/5.2/Deployment_Guide/s2-ssh-intro-why.html