← Back to Glossary

What is SSH?

by Iwan Price-Evans on Security • June 7, 2022

SSH stands for Secure Shell and is an encrypted protocol that allows two computers to communicate securely over a network. SSH is commonly used by people who need to exchange large amounts of confidential information with other computers.

Security Features of SSH

SSH uses encryption technology to ensure that only authorized users can access information. This means that no one else can see what you are doing on either computer. 

SSH has two main security features: encryption and authentication.

  • Encryption means that only authorized people can access the data being transferred.
  • Authentication ensures that the user who is accessing the data is actually the one who owns it.

Why Should I Use SSH?

There are several reasons why you should use SSH.

  1. It provides a more secure method of transferring data than using email or FTP.
  2. It encrypts the data so that only authorized users can access it.
  3. It uses strong encryption algorithms to ensure that even if someone does gain unauthorized access to your data, it will not be readable.
  4. It is free and easy to set up and use.


There are several reasons why you should use SSH instead of FTP.

  1. SSH encrypts data before sending it across the network, making it more secure than FTP.
  2. SSH uses port 22, so it will not conflict with other programs running on your computer.
  3. SSH is faster than FTP because it does not require users to wait for the file to upload.
  4. SSH is easier to set up than FTP.

How Do I Connect to SSH?

To connect to SSH, you need to first download PuTTY, a program that allows you to securely log into remote servers.

Once you have downloaded PuTTY, open it and click “New Connection”.

Then enter the IP address of the server you wish to connect to (e.g., and then select “SSH” as the type of connection.

Click “Next” and then enter the username and password for the account you wish to log into.

If you do not know the username and password, you can find them by logging into the server with another user account.