How To Use SSH For Your Activity

The cost of free internet network in Indonesia makes it difficult for people to access the internet. Which is how the internet is really needed for these times. For social media, blogging, searching for information via the internet. By using an SSH (Secure Shell) account, we can make the internet cheaper and even worse. If compared to we buy data packages from the operator, using SSH is much cheaper and unlimited. Internet SSH uses a bug/ slot/service provider hole to display free internet, SSH is illegal, SSH internet uses provider networks, even though data is solid, and loss provider.

The Function Of SSH

This SSH function is actually made to replace the previous protocol which is considered very vulnerable to data theft through harmful malware. These protocols include login, TELNET, and rsh protocol. SSH or Secure Shell is basically a network protocol which gives permissions for the exchange of data through a securely protected channel between two network devices. Especially widely used on Unix and Linux based operating systems that allow an access to shell accounts. Secure Shell is actually designed as a substitute for Telnet and any other remote shells that are insecured, that send information, especially passwords, in the form of simple text that makes it easy to intercept. Encryption that is used by Secure Shell provides data confidentiality and integrity through unsecured networks such as the internet.

As simple as sending and receiving data through other connections so that we are free from packages, quotas, or FUP. The rest about SSH can be seen here. The terms of using SSH free internet is you need to have a computer or notebook that supports internet connections, modem, and sim card.

How SSH Works

When a client tries to access a Linux server via SSH. The shell daemon that runs on both the Linux server and SSH client has a public or private key pair, each of which becomes an SSH identity for both. The connection steps re follow:

  1. Step one

The client bind on the local port a large number and connect to port 22 on the server

  1. Step 2

The client and server agree to use certain SSH expressions. This is important because SSH v.1 and v.2 are not compatible

  1. Step 3

The client requests the server’s public key and host key

  1. Step 4

The client and server approve the encryption algorithm to be used.

  1. Step 5

The client forms a session key obtained from the client and encrypts using the server’s public key

  1. Step 6

The server decrypts the session that is obtained from the client, re-encrypt it with the client’s public key, and send it back to the client verification

  1. Step 7

The user authenticates himself to the server the encrypted data stream in the session key. Until here the connection has been established and the client can then work interactively on the server or transfer files to or from the server. The seventh step above can be implemented in various ways. SSH is designed to replace services of Unix or Linux system that use plain text system such as telnet, FTP, rlogin.