O'Reilly logo

SAMS Teach Yourself Unix in 10 Minutes by Robert Shimonski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using ssh

If you understand the concepts revolving around telnet and how to use it, then you will have absolutely no problem understanding secure shell, commonly referred to as ssh and invoked with the ssh command. Secure shell is primarily used to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another just as you would with telnet. The difference is, ssh does it securely.

There are serious flaws in the telnet program as it is based on the telnet protocol, which is part of the TCP/IP protocol suite. Without getting too involved with what the suite is, remember that you had an IP address before that you needed to connect to a remote system. Well, IP is a protocol and it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required