Results From The WOW.Com Content Network
t. e. The Secure Shell Protocol ( SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.  Its most notable applications are remote login and command-line execution. SSH applications are based on a client–server architecture, connecting an SSH client instance with an SSH server. 
An SSH client is a software program which uses the secure shell protocol to connect to a remote computer. This article compares a selection of notable clients. This article compares a selection of notable clients.
SSH File Transfer Protocol. In computing, the SSH File Transfer Protocol (also known as Secure File Transfer Protocol or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell ...
Web-based SSH is the provision of Secure Shell (SSH) access through a web browser. SSH is a secure network protocol that is commonly used to remotely control servers, network devices, and other devices. With web-based SSH, users can access and manage these devices using a standard web browser, without the need to install any additional software.
ssh-agent. Secure Shell (SSH) is a protocol allowing secure remote login to a computer on a network using public-key cryptography. SSH client programs (such as ssh from OpenSSH) typically run for the duration of a remote login session and are configured to look for the user's private key in a file in the user's home directory (e.g., .ssh/id_rsa ).
Comparison of SSH servers. An SSH server is a software program which uses the Secure Shell protocol to accept connections from remote computers. SFTP / SCP file transfers and remote terminal connections are popular use cases for an SSH server.
OpenSSH or OpenBSD Secure Shell. OpenSSH (also known as OpenBSD Secure Shell [a]) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an unsecured network in a client–server architecture.  
Secure Shell tunneling. A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. Users may set up SSH tunnels to transfer unencrypted traffic over a network through an encrypted channel. It is a software-based approach to network security and the result is transparent encryption.