Liangxu Linux
Liangxu Linux
Feb 27, 2024 · Information Security

Understanding SSH: How Secure Shell Works and Why It Matters

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP by encrypting data, authenticating users, and supporting key exchange, with default port 22, various authentication methods, and tools such as PuTTY and OpenSSH for secure remote access.

EncryptionOpenSSHPutty
0 likes · 9 min read
Understanding SSH: How Secure Shell Works and Why It Matters
Liangxu Linux
Liangxu Linux
Jan 16, 2024 · Operations

How to Prevent SSH Session Freezes: Keep Your Remote Connections Alive

Learn why SSH connections drop due to TCP timeout settings and follow step‑by‑step Linux, Windows (PuTTY), and server‑side configurations—including tcp_keepalive and ServerAlive options—to keep remote sessions active and avoid idle‑disconnects for developers.

KeepaliveLinuxPutty
0 likes · 8 min read
How to Prevent SSH Session Freezes: Keep Your Remote Connections Alive
Liangxu Linux
Liangxu Linux
Nov 26, 2023 · Information Security

Understanding SSH: Ports, Authentication, and Encryption Explained

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP by encrypting data and authenticating users, typically operating on port 22, and employing both symmetric and asymmetric encryption, key exchange, and various authentication methods such as passwords and public‑key pairs.

AuthenticationOpenSSHPutty
0 likes · 10 min read
Understanding SSH: Ports, Authentication, and Encryption Explained
Open Source Linux
Open Source Linux
Nov 10, 2023 · Information Security

Understanding SSH: Ports, Workflow, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step process of establishing a secure connection, the role of symmetric and asymmetric encryption, and how password and public‑key authentication work with tools like PuTTY and OpenSSH.

AuthenticationKey ManagementOpenSSH
0 likes · 8 min read
Understanding SSH: Ports, Workflow, and Key Authentication Explained
Liangxu Linux
Liangxu Linux
Oct 15, 2023 · Information Security

Understanding SSH: Ports, Workflow, and Key Authentication Explained

SSH (Secure Shell) is a widely used network security protocol that replaces insecure methods like Telnet and FTP, operating over default port 22, supporting key exchange, encryption algorithms, multiple authentication methods, and session management, with tools such as PuTTY and OpenSSH for client connections.

AuthenticationOpenSSHPutty
0 likes · 10 min read
Understanding SSH: Ports, Workflow, and Key Authentication Explained
Programmer DD
Programmer DD
Apr 23, 2022 · Information Security

How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained

This article explains the SSH protocol, covering its default port, the step‑by‑step handshake process—including connection establishment, version and algorithm negotiation, key exchange, and user authentication methods—while also describing common clients like PuTTY and OpenSSH and the role of symmetric and asymmetric encryption.

AuthenticationEncryptionOpenSSH
0 likes · 11 min read
How SSH Secures Remote Access: Ports, Handshakes, and Key Authentication Explained
Liangxu Linux
Liangxu Linux
Feb 3, 2021 · Operations

Top GUI SSH Clients for Linux: PuTTY, EasySSH, and Terminator

This guide reviews three popular graphical SSH tools for Linux—PuTTY, EasySSH, and Terminator—covering their key features, installation steps, usage tips, and security considerations to help system administrators choose the most efficient solution for managing multiple remote servers.

EasySSHGUILinux
0 likes · 9 min read
Top GUI SSH Clients for Linux: PuTTY, EasySSH, and Terminator
Liangxu Linux
Liangxu Linux
Sep 10, 2020 · Fundamentals

Master Linux Terminal Copy‑Paste: Keyboard Shortcuts, Mouse, and Context Menu

This guide explains multiple ways to copy and paste text and commands in Linux terminals, covering keyboard shortcuts like Ctrl+Shift+C/V, right‑click context menus, mouse middle‑click pasting, terminal‑specific key bindings, and special cases such as Putty and flow‑control keys.

CommandLineCopyPasteKeyboardShortcuts
0 likes · 6 min read
Master Linux Terminal Copy‑Paste: Keyboard Shortcuts, Mouse, and Context Menu
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

Essential Linux Server Hardening: Disable Root SSH, Change Port, and More

This guide outlines practical Linux server hardening steps—including disabling root SSH login, changing the default SSH port, using SCP over FTP, installing denyhosts, managing file permissions, employing dedicated service accounts, and safely obtaining tools like PuTTY—to significantly improve system security.

DenyHostsLinuxPutty
0 likes · 5 min read
Essential Linux Server Hardening: Disable Root SSH, Change Port, and More