[{"data":1,"prerenderedAt":189},["ShallowReactive",2],{"term-s\u002Fssh":3,"related-s\u002Fssh":172},{"id":4,"title":5,"acronym":6,"body":7,"category":152,"description":153,"difficulty":154,"extension":155,"letter":156,"meta":157,"navigation":79,"path":158,"related":159,"seo":165,"sitemap":166,"stem":169,"subcategory":170,"__hash__":171},"terms\u002Fterms\u002Fs\u002Fssh.md","SSH","Secure Shell",{"type":8,"value":9,"toc":146},"minimark",[10,15,19,23,26,30,135,139,142],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"SSH is like a secure remote control for servers. You type a command on your laptop and it executes on a server across the world, all through an encrypted connection. It's the primary way developers access and manage remote servers. Way safer than the old Telnet.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"SSH is a cryptographic network protocol for secure remote login and command execution over an unsecured network. It uses public-key cryptography for authentication and encrypts all communication. Operates on port 22. Also supports file transfer (SCP\u002FSFTP) and port tunneling.",[11,27,29],{"id":28},"show-me-the-code","Show Me The Code",[31,32,37],"pre",{"className":33,"code":34,"language":35,"meta":36,"style":36},"language-bash shiki shiki-themes material-theme-lighter material-theme material-theme-palenight","# Connect to remote server\nssh user@192.168.1.100\nssh -i ~\u002F.ssh\u002Fmy_key.pem ubuntu@ec2-server.com\n\n# Copy files securely\nscp localfile.txt user@server:\u002Fremote\u002Fpath\u002F\n\n# Generate SSH key pair\nssh-keygen -t ed25519 -C \"your@email.com\"\n","bash","",[38,39,40,49,60,74,81,87,99,104,110],"code",{"__ignoreMap":36},[41,42,45],"span",{"class":43,"line":44},"line",1,[41,46,48],{"class":47},"sHwdD","# Connect to remote server\n",[41,50,52,56],{"class":43,"line":51},2,[41,53,55],{"class":54},"sBMFI","ssh",[41,57,59],{"class":58},"sfazB"," user@192.168.1.100\n",[41,61,63,65,68,71],{"class":43,"line":62},3,[41,64,55],{"class":54},[41,66,67],{"class":58}," -i",[41,69,70],{"class":58}," ~\u002F.ssh\u002Fmy_key.pem",[41,72,73],{"class":58}," ubuntu@ec2-server.com\n",[41,75,77],{"class":43,"line":76},4,[41,78,80],{"emptyLinePlaceholder":79},true,"\n",[41,82,84],{"class":43,"line":83},5,[41,85,86],{"class":47},"# Copy files securely\n",[41,88,90,93,96],{"class":43,"line":89},6,[41,91,92],{"class":54},"scp",[41,94,95],{"class":58}," localfile.txt",[41,97,98],{"class":58}," user@server:\u002Fremote\u002Fpath\u002F\n",[41,100,102],{"class":43,"line":101},7,[41,103,80],{"emptyLinePlaceholder":79},[41,105,107],{"class":43,"line":106},8,[41,108,109],{"class":47},"# Generate SSH key pair\n",[41,111,113,116,119,122,125,129,132],{"class":43,"line":112},9,[41,114,115],{"class":54},"ssh-keygen",[41,117,118],{"class":58}," -t",[41,120,121],{"class":58}," ed25519",[41,123,124],{"class":58}," -C",[41,126,128],{"class":127},"sMK4o"," \"",[41,130,131],{"class":58},"your@email.com",[41,133,134],{"class":127},"\"\n",[11,136,138],{"id":137},"when-youll-hear-this","When You'll Hear This",[16,140,141],{},"\"SSH into the server and check the logs.\" \u002F \"Add your SSH public key to the authorized_keys file.\"",[143,144,145],"style",{},"html pre.shiki code .sHwdD, html code.shiki .sHwdD{--shiki-light:#90A4AE;--shiki-light-font-style:italic;--shiki-default:#546E7A;--shiki-default-font-style:italic;--shiki-dark:#676E95;--shiki-dark-font-style:italic}html pre.shiki code .sBMFI, html code.shiki .sBMFI{--shiki-light:#E2931D;--shiki-default:#FFCB6B;--shiki-dark:#FFCB6B}html pre.shiki code .sfazB, html code.shiki .sfazB{--shiki-light:#91B859;--shiki-default:#C3E88D;--shiki-dark:#C3E88D}html pre.shiki code .sMK4o, html code.shiki .sMK4o{--shiki-light:#39ADB5;--shiki-default:#89DDFF;--shiki-dark:#89DDFF}html .light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html.light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":36,"searchDepth":51,"depth":51,"links":147},[148,149,150,151],{"id":13,"depth":51,"text":14},{"id":21,"depth":51,"text":22},{"id":28,"depth":51,"text":29},{"id":137,"depth":51,"text":138},"networking","SSH is like a secure remote control for servers.","beginner","md","s",{},"\u002Fterms\u002Fs\u002Fssh",[160,161,162,163,164],"SFTP","Tunnel","VPN","Port","Key Pair",{"title":5,"description":153},{"changefreq":167,"priority":168},"weekly",0.7,"terms\u002Fs\u002Fssh",null,"aUjt8jGGFlOCp1iGoeFxIKt_2762ScqfHGDKaUQ3Wvc",[173,177,181,185],{"title":163,"path":174,"acronym":170,"category":175,"difficulty":154,"description":176},"\u002Fterms\u002Fp\u002Fport","general","A port is like an apartment number on a building. Your computer is the building (localhost), and multiple services live inside.",{"title":160,"path":178,"acronym":179,"category":152,"difficulty":154,"description":180},"\u002Fterms\u002Fs\u002Fsftp","SSH File Transfer Protocol","SFTP is file transfer done the secure way. It uses SSH to encrypt everything — your password, the files, all of it.",{"title":161,"path":182,"acronym":170,"category":152,"difficulty":183,"description":184},"\u002Fterms\u002Ft\u002Ftunnel","intermediate","A tunnel is when you wrap one type of network traffic inside another. Imagine mailing a letter inside another letter.",{"title":162,"path":186,"acronym":187,"category":152,"difficulty":154,"description":188},"\u002Fterms\u002Fv\u002Fvpn","Virtual Private Network","A VPN creates an encrypted tunnel from your device to a server somewhere else.",1776518310387]