SSL - SSH

Secure Sockets Layer - Secure Shell

Both provide the cryptographic elements to build a tunnel
for confidential data transport with checked integrity

blogs

SSL SSH

Blogs

SSL - Secure Sockets Layer

Used to encrypt the communication between a Browser and a Web Server. SSL or sometimes called "HTTPS" is also called Security Over HTTP. With SSL the communication can be authenticated via a public-key and private-key pair

SSL is often used for sending credit card information, banking information, private emails, or just sending private information. You'll know when you are on an SSL connection because your Web Browser will have the address prefix https:// in front of the URL
You can learn more about the difference between HTTP vs HTTPS here

Examples of SSL:

Whenever you purchase a product from any On-line store such as Ebay
When you transfer funds between your checking and savings accounts
When you log into your RSH Web, Gmail or Outlook.com Email account
When you send money with PayPal
When you log into a private group account such as Yammer, GroupMe.com, or OneDrive
When you are purchasing tickets online for the next professional football or hockey game in your city
When you log into your Google Photos

ssl

SSH - Secure Shell

Is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line login and remote command execution to a Web Server, but any network service can be secured with SSH. SSH is a similar-sounding acronym, but it refers specifically to encryption for programmers and network administrators. SSH normally uses port 22 to connect your computer to another computer or Server on the internet. Network administrators will use this technique so they can remote login / remote control a business server in some other part of the city. It also provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. It is a secure alternative to the non-protected login protocols (such as telnet, rlogin) and insecure file transfer methods (such as FTP)

Examples of using SSH:

Your email administrator needs to reboot the company email server from his home
Your network administrator needs to reset your office password while she is sitting in a different office or is away on a conference
Your database administrator has to install updated software so that you can extract reports from the company finances
Your web server administrator needs to cycle the company website so that your new blog post or other content can be pushed into publishing

Similarities Between the Two Functions

Both SSL and SSH are designed to create confidential connections across the Web. With only a very few exceptions, it is not possible for a regular hacker to break into an SSL or SSH connection, but the encryption technology is as reliable as 21st-century programming can make it

Both SSL and SSH are special encryption and protocol technologies used to connect two computers. SSL and SSH lockout eavesdroppers by encrypting (ciphering) the connection, and scrambling the transmitted data so it is meaningless to anyone outside of the two


Tweet, Share, Pin, Tumble, Email


Twitter Facebook Pinterest Tumblr Send this Blog to a Friend as an Email

Categories

1997 - 2019  |  RSH Web Services  |  All Rights Reserved.

This Website Does Not Use Cookies    Nether Do We Collect Your Information