Secure Socket Shell or SSH is a protocol which ensures that a user can link to a remote computer in a secure manner. It helps in establishing authentication and secure encrypted data communication between two remotely connected users over an unsecured network such as the internet.

Primarily, Secure Socket Shell has been designed to ensure secure remote logins and network services. It works as a replacement for RCP, TELNET, and RSH etc. Network administrators widely use this protocol to log in to a remote computer over a network, it can also help in moving files from one computer to the other.

SSH helps in protecting your network from IP spoofing attacks and DNS spoofing. In case of an attack, the attacker won’t be able to hijack your connection. The whole session remains secured as the SSH slogin ensures that every transmitted data remains encrypted.

There are 2 versions available in the SSH protocol:

  • version 1.0, and
  • version 2.0

The first version (version 1.0) can connect you with a remote computer to carry out all the commands. However, this version still suffers from some vulnerabilities due to which it is more prone to active attacks whereas the second version (2.0) of the Secure Socket Shell protocol is comparatively safer than the first version.