Bookmark this page

Summary

  • The Secure Shell Protocol (SSH) provides access to remote computers and sends commands or files. The SSH protocol is managed by the SSH daemon, also known as the sshd system service.

  • You can log in to a remote computer by using its IP address. In network environments that use Domain Name Service (DNS), you can use the remote computer hostname to log in.

  • Use the scp command to copy files over an encrypted network connection. You can copy files from your local computer to a remote system, from a remote system to your local computer, or between remote systems.

  • Use SSH key pairs to avoid using passwords to log in to remote systems. A key pair consists of a private key and a public key that when combined, confirm your identity.

  • You distribute the public key to remote servers by using the ssh-copy-id command. You keep the private key secure and prevent any unauthorized access to it.

  • Graphical and command-line applications run as processes in Linux. A process can run as a foreground process or as a background process. A background process is usually a system service that is started by the Linux system, which is known as a daemon.

  • You can use graphical or command-line tools to monitor the system's resource usage or to obtain process information, such as the PID. Terminate a crashed application to free its resources.

Revision: rh104-9.1-3d1f2bc