-
Notifications
You must be signed in to change notification settings - Fork 0
Notes Class 07
The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another.
The protocol is used in corporate networks for:
- providing secure access for users and automated processes
- interactive and automated file transfers
- issuing remote commands
- managing network infrastructure and other mission-critical system components.
The protocol works in the client-server model, which means that the connection is established by the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the identity of the SSH server. After the setup phase the SSH protocol uses strong symmetric encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server.
The data that is transmitted is encrypted according to the parameters negotiated in the setup. During the negotiation the client and server agree on the symmetric encryption algorithm to be used and generate the encryption key that will be used.
The SFTP (SSH File Transfer Protocol) is probably the most widely used secure file transfer protocol today
The Windows Remote Desktop Connection tool gives users the ability to connect to a remote Windows PC or server over the internet or on a local network, giving them full access to the tools and software installed on it.
The Remote Desktop Protocol allows remote users to see and use Windows on a device in another location. For RDP connections to work, you need two components—an RDP server and an RDP client.
The RDP port (port 3389) is well known and regularly scanned for exploits.
If you want to remote to someone else's computer, do you them to download software first?