SSL - Secure Sockets Layer

Used to encrypt the communication between a Browser and a Web Server. SSL or sometimes called "HTTPS" is also called Security Over HTTP. With SSL the communication can be authenticated via a public-key and private-key pair

SSL is often used for sending credit card information, banking information, private emails, or just sending private information. You will know when you are on an SSL connection because your Web Browser will have the address prefix https:// in front of the URL

Who uses SSL

Whenever you purchase a product from any On-line store such as Ebay
When you transfer funds between your checking and savings accounts
When you log into your RSH Web, Gmail or Email account
When you send money with PayPal
When you log into a private group account such as Yammer,, or OneDrive
When you are purchasing tickets online for the next professional football or hockey game in your city
When you log into your Google Photos


SSH - Secure Shell

Is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line login and remote command execution to a Web Server, but any network service can be secured with SSH. SSH is a similar-sounding acronym, but it refers specifically to Encryption for programmers and network administrators. SSH normally uses port 22 to connect your computer to another computer or Server on the internet. Network administrators will use this technique so they can remote login / remote control a business server in some other part of the city. It also provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. It is a secure alternative to the non-protected login protocols (such as telnet, rlogin) and insecure file transfer methods (such as FTP)

Examples of using SSH:

Your email administrator needs to reboot the company email server from his home
Your network administrator needs to reset your office password while she is sitting in a different office or is away on a conference
Your database administrator has to install updated software so that you can extract reports from the company finances
Your web server administrator needs to cycle the company website so that your new blog post or other content can be pushed into publishing

Similarities Between the Two Functions

Both SSL and SSH are designed to create confidential connections across the Web. With only a very few exceptions, it is not possible for a regular hacker to break into an SSL or SSH connection, but the encryption technology is as reliable as 21st-century programming can make it

Both SSL and SSH are special encryption and protocol technologies used to connect two computers. SSL and SSH lockout eavesdroppers by encrypting (ciphering) the connection, and scrambling the transmitted data so it is meaningless to anyone outside of the two

Free SSL Certificates with all hosting accounts RSH Web Services

Comments, questions or leave a reply
Contact Us

Tweet  Share  Pin  Tumble  Email