Part 3/10:
The primary function of SSH is to allow users to operate remote computer terminals as if they are local. This abstraction is crucial for accessing and managing systems securely. For connection establishment, the user inputs the command ssh
followed by the username and the host (which could be either an IP address or a hostname).
While users can authenticate using a password, reliance solely on this method is discouraged due to potential security vulnerabilities. Instead, it is highly recommended to use authentication keys, which are encrypted and mitigate interception risks.