What is SSL and SSH

Both provide the cryptographic elements to build a tunnel
for confidential data transport with checked integrity

Secure Sockets Layer - Secure Shell

Updated: August 6, 2023
By: RSH Web Editorial Staff

Contact Us


SSL - Secure Sockets Layer

It is used to encrypt the communication between a Web Browser and a Web Server. SSL or sometimes called HTTPS is also called Security Over HTTP. With SSL, the communication can be authenticated via a public-key and private-key pair.

SSL is often used for sending credit card information, banking information, private emails, or just sending private information. You will know when you are on an SSL connection because your Web Browser will have the address prefix https:// in front of the URL.

How SSL Works

When you visit a website, (provided the site has an SSL certificate). Your Browser and the website begin to what is known as the SSL handshake. The Browser checks the validity of the SSL certificate. Making sure it is authenticated by a legitimate party and therefore trustworthy. Every SSL certificate has two keys. A private key and associated public key. Their job is to handle encryption and decryption to communicate securely during the SSL handshake. After your browser confirms the SSL certificate is valid, the Web Server and the browser then creates what is known as a session key. Once a secure connection is established, both are communicating safely.

Advantages of SSL

SSL encryption for your website is Security. The level of customer confidence and trust in a site increases 10-fold. Internet users have come to expect the HTTPS// prefix in their browser in order to be comfortable submitting any sensitive information. Google’s Gary Illyes interviewed in 2015 affirmed that when two web pages are otherwise equal, Google prefers HTTPS sites. Pushing the more secure URL to the head of the line.

Customer information, like credit card numbers, is encrypted and Secure
Visitors can quickly tell whether you are the registered business and owner of the Domain
Customers are more likely to trust and purchase from Websites that use HTTPS

Uses For SSL

Whenever you purchase a product from any On-line store such as Ebay
When you transfer funds between your checking and savings accounts
When you log into your RSH Web Mail, Gmail or Outlook.com Email account
When you send money with PayPal
When you log into a private group account such as Yammer, GroupMe.com, or OneDrive
When you are purchasing tickets on-line for the next professional football or hockey game in your city
When you log into your Google Photos

Types Of SSL Certificates

Green Bar EV SSL Certificates
As the highest class of SSL available, Extended Validation SSL Certificates (EV SSL) activate both the padlock and the green address bar in all major browsers.

Multiple Domain Certificates
A Unified Communications Certificate (UCC) is an SSL certificate that secures multiple domain names and multiple host names within a domain name. A UCC lets you secure a primary domain name and up to 99 additional domains in a single certificate.

Wildcard Certificate
Wildcard SSL certificates secures your website URL and an unlimited number of its subdomains. For example, a single Wildcard certificate can secure domain.rshweb.com, blog.rshweb.com etc.

Single Domain Certificate
Single domain SSL certificates provide security for a single fully qualified domain name. The straightforward nature of Single Domain SSL Certificates is an ideal solution for any size website.


SSL is a Security technology. It is a protocol for Servers and web browsers that makes sure that the data passed between the two are private and secure. This is done using an encrypted link that connects your Browser and the Web Server. Companies that request personal information from a user, such as payment information, should be using an SSL certificate on their website. Having one means that the details you are collecting are private and ensures to the customer that when they see the padlock and https://, their privacy is safe.


SSH - Secure Shell

Early network protocols like Telnet and Remote Shell "RSH" did not provide enough protection against malicious cyberattacks. The need for a more secure network communication method inspired the creation of the SSH protocol.

SSH is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line login and remote command execution to a Web Server, but any network service can be secured with SSH. SSH refers specifically to Encryption for programmers and network administrators. SSH normally uses port 22 to connect your computer to another computer or Server on the Internet. Network administrators will use this technique, so they can log in and remotely control a Server anywhere in the world. It also provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. It is a secure alternative to the non-protected login protocols such as telnet, rlogin. And insecure file transfer methods such as FTP.

Any Linux or macOS user can SSH into their remote server directly from the terminal window. You can execute shell commands in the same manner as you would if you were physically operating the remote computer.

SSH clients that are used to connect to a remote computer. It makes the use of a secure shell protocol, to provide this functionality

Windows SSH client alternatives

PuTTY - A free SSH and Telnet client

WinSCP - WinSCP is an open source free SSH client for Windows

FileZilla - FileZilla SSH and FTP client The FileZilla project is an open source development

Mac SSH client alternatives

CyberDuck - Cyberduck is a file transfer client for Apple Mac, supporting SSH

Commander One - Commander One is a free File Manager created in Swift

PuTTY for Mac - PuTTY for Mac is a port of the Windows version of PuTTY with many options for SSH clients for Mac

Examples of using SSH:

Your Administrator needs to reboot the company Server from his home
Your network administrator needs to reset your office password
Your database administrator has to install updated software from home
Your web server administrator needs to update the company website while on vacation

Similarities Between the Two Functions

Both SSL and SSH are designed to create confidential connections across the Web. With only a very few exceptions, it is not possible for a regular hacker to break into an SSL or SSH connection, but the encryption technology is only as reliable as programming can make it.

Both SSL and SSH are special encryption and protocol technologies used to connect two computers. SSL and SSH lockout eavesdroppers by encrypting or ciphering the connection and scrambling the transmitted data.

SSL Certificates included with all hosting plans

We welcome your comments, questions, corrections and additional information relating to this article. Please be aware that off-topic comments will be deleted.
If you need specific help with your account, feel free to contact us anytime
Thank you

Tweet  Share  Pin  Email

More Articles Of Interest

Looking for the best website hosting solution? We provide our customers with high quality and 100% guaranteed hosting services