SSH Windows

SSH Windows

SSH Windows-SSH is an acronym for Secure Shell which is a network protocol that uses cryptography to communicate data on network devices to make it safer. In the concept, the use of SSH must be supported by servers or devices or client computers that exchange data. Both must have an SSH Server from the server computer side and Client SSH for the recipient's computer (client).
Widely used on Linux and Unix-based operating systems to access Shell accounts, SSH is designed as a substitute for Telnet and other insecure remote shells, which send information, especially passwords, in a simple text form that makes it easy to intercept. The encryption used by SSH provides data confidentiality and integrity over insecure networks such as the internet.

SSH function

The SSH function can be used to replace telnet, rlogin, ftp and rsh, one of its main functions is to ensure security in transmitting data on a network. SSH is widely used by various network admin in several parts of the world to control the web and other types of networks such as WAN. This SSH function is actually made to replace the previous protocol which is considered very vulnerable to data theft through malicious malware. SSH Windows. These protocols include rlogin, telnet and rsh protocol.

Other SSH functions are:

  1. Encrypt the data sent,
  2. Protocol for exchanging data in a network,
  3. Authentication, a mechanism to ensure the sender and recipient are correct and safe
  4. Confidentiality, ensuring the confidentiality of the power sent so that it is only known by the recipient and the sender.

Benefits of using SSH

The use of using an SSH account is to further increase data security on your computer when accessing the internet, because with the SSH Account as an intermediary for your internet connection, SSH will provide encryption to all the data that is read, then send it to another server.
In addition to functioning to encrypt data, SSH is also used to do Port Forwarding which allows us to get the following benefits:

1. Connect TCP applications (for example: web server, mail server, FTP server) with more secure (secure)
2. Connect by bypassing (bypassing) the local firewall or proxy.

The second benefit above is often sought by Internet users and uses it for the benefit of internet access. By using an SSH account you can also manage VPS for hosting or other functionality.
Using an SSH account to tunneling your internet connection does not guarantee increasing your internet speed. But by using an SSH account, the IP you use automatically will be static and you can use it privately as long as you are the only user in the SSH account. SSH Windows
This SSH protocol has many functions, besides the tunneling function that we often use, we can also use SSH for SFTP, SOCKS4 / 5 proxy or we can also use it to manage our VPS or hosting, especially VPS with OS Linux like CentOS. To use tunneling using SSH we can use the SSH client like Bitvise Tunnelier or Putty for the Windows operating system.
To get an account and use from SSH, we can get a free SSH account on cjb.net or if we have VPS, the provider usually provides SSH for our VPS settings. SSH Windows

 SSH Windows Download :
SSH SERVER
Free Download
SSH CLIENT
Free Download

Usability of SSH

SSH is designed to replace telnet and FTP protocols. SSH is a versatile product designed to do many things, most of which are tunnel creation between hosts. SSH Windows. Two important things SSH are console login (replacing telnet) and secure filetransfer (replacing FTP), but with SSH you also get the ability to form a source tunnel to pass HTTP, FTP, POP3, and anything else through the SSH tuner. SSH Windows

Public Key Cryptography (Public Key Cryptography)

SSH uses the public-key cryptography method to encrypt communication between two hosts, as well as user authentication. With this method, we will need 2 different keys that are used both for encryption and decryption. Each of the two keys is called a public key (published to the public / others) and a private key (kept secret / only the owner knows). Each key above can be used to encrypt and decrypt.

How SSH works

Public / private key, each of which becomes an SSH identity for both.
The connection steps are as follows :

Step 1
The client bind to a large local port number and connect to port 22 on the server. SSH Windows
Step 2
The client and server agree to use certain SSH sessions. This is an important note because SSH v.1 and v.2 are not compatible.
Step 3
The client requests the server's public key and host key.
Step 4
The client and server approve the encryption algorithm that will be used (for example TripleDES or IDEA).
Step 5
The client forms a session key obtained from the client and encrypts it using the server's public key.
Step 6
The server decrypts the session obtained from the client, re-encrypts it with the client's public key, and sends it back to the client for verification.
Step 7
The user authenticates himself to the server in the encrypted data stream in the session key. Until now the connection has been established, and the client can then work interactively on the server or transfer files to or from the server. The seventh step above can be implemented in various ways (username / password, SSH Windows, kerberos, RSA and others).

Discussion: