Telnet is a command-line tool that allows remote computers to communicate with Telnet. Security was the biggest problem with Telnet (and still is). Because no encryption is used for data transfer between remote computers and yours, anyone can wiretap your communication line to see sensitive data. The data being transmitted can also be altered by third parties. If configured correctly, the SSH client is not vulnerable to such a weakness. What does it mean to say “if configured appropriately?” The systems that encrypt or decrypt data are known as cryptosystems. There are many types. The configuration required for the RSA cryptosystem, which is very secure, will be explained to you. I won’t go into the math, but I will tell you the truth. To connect to our server via SSH, we will use Putty, a popular and free tool. Three EXE files are required to be downloaded from the Putty home page: putty, puttygen, and Pageant.
We need to convert our private key from Putty into a Putty-specific format in order to use it. First, save your private key file (id_rsa), to your Windows PC. Double-click on puttygen.exe to run it. Click on the Conversions menu, and choose Import Key. Enter the passphrase that you have previously defined. Next, click the Save private key button to save your Putty-imported key. This key will be used to connect to remote servers via Putty. Now, run pageant.exe. The pageant is used for storing your passphrase in memory. This will ensure that you don’t have to ask your passphrase every time you connect to the remote server. The pageant will add an icon to your taskbar. Right-click that icon and choose Add Key. Select the Putty-imported key file from step 1. Enter your passphrase. Execute putty.exe. It will connect to the remote computer. Choose SSH client for the Connection Type, and enter the hostname/IP address of the remote machine.
Click on Open, and voila! Enter your login name to the remote server. Now you have established a secure connection with the remote server. You can ask any questions via the Questions button at the top right of our website. This configuration will allow it to redirect all traffic from the local machine’s port number 8080 through the SSH tunnel. The remote end will then redirect traffic to the localhost (which is itself) port 80. If the remote machine runs a web server, all content will be encrypted and sent through the SSH tunnel. Forward tunnels are a special tool that can be used to bypass firewalls and content filtering services, and allow remote access. Ubuntu users can install open ssh server using the following command: sudo apt-get install openssh-server(config files are stored in /etc/ssh/sshd_config), also a Linux version of putty is available and can be obtained using synaptic package manager.