Saturday, October 31, 2009

SSH


Setting up a webpage is not an easy thing. However, a better way to deal with the complexity is to set aside the less important things and instead focus your attention on the essentials like security.
By default, connection to the Internet is not protected. If you go on and transfer your data over a non-secure connection, there's good chance that other people might see or even get hold of your data. They could sell these information or benefit from them in ways that are disadvantageous to you. Suppose that you are running the website for your company, when this happens, you may end up losing valuable information or a handful of clients just because you failed to invest on security. Integrity is everything for consumers. Once they noticed that you are not serious enough about the security, they may choose not to trust your company. Basically this is why we need SSH.
SSH shorts for Secure Shell, which is one of the most trusted names when it comes to data confidentiality and security. It is a network protocol that allows data to be exchanged using a secure channel between two networked devices. [1]SSH provides web administrators a more secured way to access their servers even when using a remote computer. Through an encrypted connection, SSH access allows you to log in to your account. By using encryption, all data will be shown in an unreadable format, which makes it hard for hackers to get anything from it. A login system installed with SSH requires a user to undergo heavy authentication process to tell whether or not the user who is trying to open the account is authorized.
Once you're logged in through SSH, it will communicate with the remote computer. Because the connection is secured, the two computers will talk and exchange information secretly. Should another person tries to tap on the conversation, SSH will automatically act as a shield. It will simply shoo away the intruder by giving only senseless data. If the intruder continues to disrupt the conversation, SSH will then disconnect. Moreover, since SSH is compatible with all major operating systems, you won't have any trouble installing this product in your system.
Suppose that you're a webmaster and now you need to do a maintenance or update on your server. You are far from the office and a public computer is just by your side. Accessing your web server through a public computer is totally unsecured. But by installing an SSH before you transfer classified information, any authorized person like you may be able to finish your work without worrying about threats brought by a non-secure connection.
Reference:
[1] http://en.wikipedia.org/wiki/Secure_Shell

No comments:

Post a Comment

Followers