SSH Glossary

schedule Created: December 3, 2025 at 03:18 AM
update Last Updated: December 3, 2025 at 03:18 AM

SSH Glossary

This file provides a simple explanation of technical terms related to remote server access. The search UI is provided by the application, so this file only contains a static list of terms.

SSH (Secure Shell)

Basics
This is a technology that allows you to securely control another computer over the Internet. You can use it as if you were sitting in front of that computer and operating it directly.
Example: You can work on a computer in your company office from home using SSH.

Security Key (Private Key)

Security
This is the electronic key file used to connect to the server. This file is used instead of a password to verify your identity. You should never share your security key with anyone else.
Example: The my-server-key.pem file is your security key. Only those with this file can connect to the server.

Server

Basic
A computer that provides services to other computers. StreamGPU-created servers are high-performance computers capable of processing GPU tasks.

Port

Network
The port number through which a specific service communicates on a computer. When connecting with SSH, you must specify a port number to connect to the correct service.
Example: -p 2222 means connect to port 2222.

Terminal

Tool
A program for entering commands using text. It's called PowerShell on Windows and Terminal on Mac and Linux.

Session

Basic
This refers to the connection to a server. If the network is disconnected, your session will end, and any running tasks may be interrupted. You can maintain your session by using tmux or screen.

File Permissions

Security
This setting determines who can read, write, and execute a file. Security Key File permissions should be restricted so that only the owner can read them.
Example: chmod 600 allows only the file owner to read and write.

Host Key

Security
This is information like a fingerprint that verifies the authenticity of the server. When you first connect to the server, you will be prompted to confirm the host key. If the server is trustworthy, enter "yes."

SCP (Secure Copy)

File Transfer
This is a method of securely exchanging files using SSH. It is used to transfer files between your local computer and a server.
Example: scp myfile.txt user@server:~/ sends myfile.txt to the server.

ssh-keygen

Tool
A command-line tool that generates SSH key pairs (public + private). StreamGPU provides server-side keys in some cases, but you may generate your own.
Example: ssh-keygen -t ed25519 -C "me@example.com"

SFTP (SSH File Transfer Protocol)

File Transfer
A protocol that transfers files securely over an SSH connection. Unlike FTP, SFTP encrypts data and supports interactive directory navigation and file operations.
SCP vs SFTP: SCP is simple copy; SFTP is better for browsing and managing multiple files.

icacls (Windows permission tool)

Tool
A Windows command to manage file and folder access control lists (ACLs). It is roughly equivalent to Linux chmod for controlling who can read the SSH key files.
Example: icacls key.pem /inheritance:r /grant:r "USERNAME:(R)"

PuTTYgen

Tool
A key generation and conversion tool used by the PuTTY SSH client on Windows. Use PuTTYgen to convert a .pem key into PuTTY's .ppk format when required by PuTTY or Pageant.
Run PuTTYgen → Load your .pem → Save private key (.ppk).

ssh-agent / Pageant

Tool
Programs that hold your private keys in memory so you don't need to type the key file path each time. ssh-agent is common on Mac/Linux and Pageant is used with PuTTY on Windows.
ssh-add ~/.ssh/streamgpu/my-key.pem

known_hosts

Security
A file that stores host keys (fingerprints) of servers you previously connected to. On subsequent connections, the client verifies the server's host key against this file to detect tampering. Typically located at ~/.ssh/known_hosts.
If a server is reinstalled and its host key changes, remove the matching line from known_hosts and reconnect.

tmux / screen

Tools
This program allows tasks to continue running even when the network is down. It's useful for long-running tasks.

Port Forwarding

Network
This function connects a specific port on a server to a local computer. It allows you to view web applications running on the server using your computer's browser.

Firewall

Security
This is a security system that blocks unauthorized access. You can configure it to allow access only from specific IP addresses or ports.

IP address

Network
This is the address used to find your computer on the Internet.
Example: 192.168.1.100 or 203.0.113.5

Username

Default
This is the account name used to connect to the server. You must use the username displayed on the dashboard.

Path