Secure Shell (SSH) is a network protocol that can be used to securely connect computers over the internet or other non-secure networks.
Using SSH tunnelling it is possible to encrypt the data sent between the networked devices, even when the application being used does not support encryption. VNC for example encrypts the password used to connect to the VNC Server but does not encrypt data.
SSH can be used for the following tasks (please note this list is not exhaustive) which are covered in this guide -
The two main methods of authenticating a connection to the SSH server are password identification using the name and password of a valid user account or using keyfile based login. Keyfile based login can also be combined with a passphrase to enhance security. This guide covers keyfile based login only, due to the added security of using this method.