{"version":"1.0","provider_name":"PHEONIXSOLUTIONS","provider_url":"https:\/\/pheonixsolutions.com\/blog","author_name":"ajith kumar","author_url":"https:\/\/pheonixsolutions.com\/blog\/author\/ajithkumar\/","title":"Pheonix Solutions - We Empower Your Business Growth","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"XVmB0Ext3k\"><a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-ssh-remote-server-via-terminal\/\">How to SSH remote server via Terminal<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/pheonixsolutions.com\/blog\/how-to-ssh-remote-server-via-terminal\/embed\/#?secret=XVmB0Ext3k\" width=\"600\" height=\"338\" title=\"&#8220;How to SSH remote server via Terminal&#8221; &#8212; PHEONIXSOLUTIONS\" data-secret=\"XVmB0Ext3k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/pheonixsolutions.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Introduction SSH or Secure Shell is a cryptographic network protocol that provides a secure way to access and manage network devices and servers over an unsecured network. It is widely used for securely connecting to remote systems, executing commands, and transferring files. Prerequisites Implementation : Without port number (Default port&hellip; Continue Reading","thumbnail_url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png","thumbnail_width":3837,"thumbnail_height":2540}