DEV Community

Cover image for How SSH (Secure Shell) Works
Thodoris Kouleris
Thodoris Kouleris

Posted on

1 2 1

How SSH (Secure Shell) Works

Why SSH (Secure Shell) Exists

The most well-known application for remote management of a computer since the 1960's was Telnet. In fact, its popularity was such that even in the early 2000, there were network devices using Telnet for remote management.

The problem, however, was that Telnet had no encryption, meaning that anyone with a packet sniffer could intercept passwords or any information exchanged between two points.

SSH solved this exact problem. Tatu Ylonen, another Finnish figure in computer history, gave us the first version in 1995. He chose port 22 because it was between port 23 for Telnet and port 21 for FTP. SSH was using cryptography to secure the data transmission.

read more

Top comments (0)

Image of DataStax

AI Agents Made Easy with Langflow

Connect models, vector stores, memory and other AI building blocks with the click of a button to build and deploy AI-powered agents.

Get started for free

👋 Kindness is contagious

Explore a trove of insights in this engaging article, celebrated within our welcoming DEV Community. Developers from every background are invited to join and enhance our shared wisdom.

A genuine "thank you" can truly uplift someone’s day. Feel free to express your gratitude in the comments below!

On DEV, our collective exchange of knowledge lightens the road ahead and strengthens our community bonds. Found something valuable here? A small thank you to the author can make a big difference.

Okay