Skip to main content

SSH Explanation


SSH in the terminal means Secure Shell.

It is a protocol used to securely connect from one computer to another over a network, most commonly to control a remote server through a command-line interface (the terminal).

What it’s used for

  • Logging into remote servers
  • Running commands on another machine
  • Managing servers and cloud instances
  • Transferring files securely (via SCP or SFTP)

Basic idea

You type an SSH command in your terminal, and it opens a secure, encrypted session to another computer.

Example

ssh user@server_address
  • user = username on the remote machine
  • server_address = IP address or domain name of the remote machine

Why it matters

  • Encrypted (safe from eavesdropping)
  • Replaces insecure methods like Telnet
  • Standard tool in Linux, macOS, and developer workflows

Step-by-step example of using SSH

Step 1: Open a terminal

  • Linux / macOS: Open Terminal
  • Windows: Open PowerShell or Windows Terminal

Step 2: Make sure SSH is available

ssh -V

If SSH is installed, you will see a version number.

Step 3: Connect to a remote server (password login)

ssh username@server_ip

Example

ssh john@192.168.1.50
  1. The terminal tries to connect to the server.
  2. You may be asked to trust the host.
  3. Enter the user’s password.
  4. You are now logged into the remote machine.

Step 4: Run commands on the remote server

ls
pwd
uptime

Step 5: Exit the SSH session

exit

or press Ctrl + D

Step 6: Use SSH keys instead of passwords (Recommended)

Generate a key

ssh-keygen
  • Private key: ~/.ssh/id_rsa
  • Public key: ~/.ssh/id_rsa.pub

Copy the public key to the server

ssh-copy-id username@server_ip

Log in using the key

ssh username@server_ip

Main applications of SSH

1. Remote login and server administration

  • Administering Linux servers
  • Managing cloud servers
  • Controlling servers remotely

2. Secure remote command execution

ssh user@server "df -h"

3. Secure file transfer

scp file.txt user@server:/home/user/
sftp user@server

4. Tunneling and port forwarding

Used for secure access to internal services.

5. Version control access

Used with GitHub, GitLab, Bitbucket.

6. Automation and scripting

ssh user@server "sudo apt update && sudo apt upgrade -y"

Git + SSH

git clone git@github.com:username/project.git

Automation with SSH

ssh user@server "uptime"

Summary

  • Secure remote access
  • Secure file transfer
  • Automation and deployment
  • Encrypted tunneling
  • Authentication for developer tools

Further Reading


People are good at skipping over material they already know!

View Related Topics to







Contact Us

Name

Email *

Message *

Popular Posts

BER vs SNR for M-ary QAM, M-ary PSK, QPSK, BPSK, ...(MATLAB Code + Simulator)

Bit Error Rate (BER) & SNR Guide Analyze communication system performance with our interactive simulators and MATLAB tools. 📘 Theory 🧮 Simulators 💻 MATLAB Code 📚 Resources BER Definition SNR Formula BER Calculator MATLAB Comparison 📂 Explore M-ary QAM, PSK, and QPSK Topics ▼ 🧮 Constellation Simulator: M-ary QAM 🧮 Constellation Simulator: M-ary PSK 🧮 BER calculation for ASK, FSK, and PSK 🧮 Approaches to BER vs SNR What is Bit Error Rate (BER)? The BER indicates how many corrupted bits are received compared to the total number of bits sent. It is the primary figure of merit for a...

ASK, FSK, and PSK (with MATLAB + Online Simulator)

📘 ASK Theory 📘 FSK Theory 📘 PSK Theory 📊 Comparison 🧮 MATLAB Codes 🎮 Simulator ASK or OFF ON Keying ASK is a simple (less complex) Digital Modulation Scheme where we vary the modulation signal's amplitude or voltage by the message signal's amplitude or voltage. We select two levels (two different voltage levels) for transmitting modulated message signals. Example: "+5 Volt" (upper level) and "0 Volt" (lower level). To transmit binary bit "1", the transmitter sends "+5 Volts", and for bit "0", it sends no power. The receiver uses filters to detect whether a binary "1" or "0" was transmitted. Fig 1: Output of ASK, FSK, and PSK modulation using MATLAB for a data stream "1 1 0 0 1 0 1 0" ( Get MATLAB Code ) ...

Calculation of SNR from FFT bins in MATLAB

📘 Overview 💻 FFT Bin Method 💻 Kaiser Window 📚 Further Reading SNR Estimation Overview In digital signal processing, estimating the Signal-to-Noise Ratio (SNR) accurately is crucial. Below, we demonstrate how to calculate SNR from periodogram and FFT bins using the Kaiser Window . The beta (β) parameter is the key—it allows you to control the trade-off between main-lobe width and side-lobe levels for precise spectral analysis. 1 Define Sampling rate and Time vector 2 Compute FFT and Periodogram PSD 3 Identify Signal Bin and Frequency resolution 4 Segment Signal Power from Noise floor 5 Logarithmic calculation of SNR in dB Method 1: Estimation from FFT Bins This approach uses a Hamming window to estimate SNR directly from the spectral bins. MATLAB Source Code Copy Code clc...

Online Simulator for ASK, FSK, and PSK

Try our new Digital Signal Processing Simulator!   •   Interactive ASK, FSK, and BPSK tools updated for 2025. Start Now Interactive Modulation Simulators Visualize binary modulation techniques (ASK, FSK, BPSK) in real-time with adjustable carrier and sampling parameters. 📡 ASK Simulator 📶 FSK Simulator 🎚️ BPSK Simulator 📚 More Topics ASK Modulator FSK Modulator BPSK Modulator More Topics Simulator for Binary ASK Modulation Digital Message Bits Carrier Freq (Hz) Sampling Rate (...

Constellation Diagrams of ASK, PSK, and FSK (with MATLAB Code + Simulator)

Constellation Diagrams: ASK, FSK, and PSK Comprehensive guide to signal space representation, including interactive simulators and MATLAB implementations. 📘 Overview 🧮 Simulator ⚖️ Theory 📚 Resources Definitions Constellation Tool Key Points MATLAB Code 📂 Other Topics: M-ary PSK & QAM Diagrams ▼ 🧮 Simulator for M-ary PSK Constellation 🧮 Simulator for M-ary QAM Constellation BASK (Binary ASK) Modulation Transmits one of two signals: 0 or -√Eb, where Eb​ is the energy per bit. These signals represent binary 0 and 1. BFSK (Binary FSK) Modulation Transmits one ...

FIR vs IIR Digital Filters and Recursive vs Non Recursive Filters

Filters >> FIR vs. IIR Digital Filters and Recursive vs. Non-Recursive Filters Key Features The higher the order of a filter, the sharper the stopband transition The sharpness of FIR and IIR filters is very different for the same order A FIR filter has an equal time delay at all frequencies, while the IIR filter's time delay varies with frequency. Usually, the biggest time delay in the IIR filter is at the filter's cutoff frequency. The term 'IR' (impulse response) is in both FIR and IIR. The term 'impulse response' refers to the appearance of the filter in the time domain. 1. What Is the Difference Between an FIR and an IIR Filters? The two major classifications of digital filters used for signal filtration are FIR and IIR....

MATLAB Code for ASK, FSK, and PSK (with Online Simulator)

MATLAB Code for ASK, FSK, and PSK Comprehensive implementation of digital modulation and demodulation techniques with simulation results. 📘 Theory 📡 ASK Code 📶 FSK Code 🎚️ PSK Code 🕹️ Simulator 📚 Further Reading Amplitude Shift Frequency Shift Phase Shift Live Simulator ASK, FSK & PSK HomePage MATLAB Code MATLAB Code for ASK Modulation and Demodulation COPY % The code is written by SalimWireless.Com clc; clear all; close all; % Parameters Tb = 1; fc = 10; N_bits = 10; Fs = 100 * fc; Ts = 1/Fs; samples_per_bit = Fs * Tb; rng(10); binar...

Theoretical BER vs SNR for m-ary PSK and QAM

Relationship Between Bit Error Rate (BER) and Signal-to-Noise Ratio (SNR) The relationship between Bit Error Rate (BER) and Signal-to-Noise Ratio (SNR) is a fundamental concept in digital communication systems. Here’s a detailed explanation: BER (Bit Error Rate): The ratio of the number of bits incorrectly received to the total number of bits transmitted. It measures the quality of the communication link. SNR (Signal-to-Noise Ratio): The ratio of the signal power to the noise power, indicating how much the signal is corrupted by noise. Relationship The BER typically decreases as the SNR increases. This relationship helps evaluate the performance of various modulation schemes. BPSK (Binary Phase Shift Keying) Simple and robust. BER in AWGN channel: BER = 0.5 × erfc(√SNR) Performs well at low SNR. QPSK (Quadrature...