In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
This article introduces the knowledge of "how to use ssh in linux". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!
Ssh in linux is the abbreviation of "Secure Shell". It is a security protocol based on application layer and transport layer, which is used for encrypted login between computers. Ssh can not only connect the server remotely, but also transfer data with the help of ssh protocol to provide more secure SFTP services.
The operating environment of this tutorial: linux7.3 system, Dell G3 computer.
What does ssh mean in linux
To put it simply, SSH (Secure Shell Protocol) is a network protocol used to encrypt logins between computers. In the default state, SSH service provides two service functions, one is to provide services similar to telnet remote online server, namely SSH service, and the other is sftp-server similar to FTP service, which uses SSH protocol to transfer data and provides more secure SFTP services.
Reminder: the SSH client (ssh command) contains a useful remote secure copy command, scp, which also works through the ssh protocol.
SSH is an acronym for Secure Shell and was developed by IETF's network team (Network Working Group)
SSH is a security protocol based on the application layer. SSH is a reliable protocol designed to provide security for remote login sessions and other network services. The use of SSH protocol can effectively prevent information leakage in the process of remote management. SSH was originally a program on the UNIX system, and then rapidly expanded to other operating platforms.
When used correctly, SSH can make up for loopholes in the network. The SSH client is suitable for a variety of platforms. Almost all UNIX platforms-including HP-UX, Linux, AIX, Solaris, Digital UNIX, Irix, and others-can run SSH.
The ssh command is used to remotely log in to the Linux host.
Common format: ssh [- l login_name] [- p port] [user@] hostname
More details can be seen with man ssh.
Do not specify a user and log in using a root account by default
Ssh 192.168.0.15
Specify the user:
Ssh-l root 192.168.0.15 ssh root@192.168.0.15
If you have modified the ssh login port, you can:
Ssh-p 521 192.168.0.15 ssh-l root-p 521 192.168.0.15 ssh-p 521 root@192.168.0.15
In addition, modify the configuration file / etc/ssh/sshd_config, you can change the ssh login port and disable root login. Changing the port prevents it from being scanned by the port. (/ etc/ssh/sshd_config this file is server-side, / etc/ssh/ssh_config this is client-side, scan port software nmap installs yum install nmap-y use, nmap and ip or domain name-p 1-65535)
Edit the configuration file:
Vim / etc/ssh/sshd_config
Find # Port 22, remove the comments, and modify it to a three-digit port:
Port 521
Find # PermitRootLogin yes, remove the comments, and modify it to:
PermitRootLogin no
Restart the sshd service:
Service sshd restart
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.