SSH Glossary
schedule Created: December 3, 2025 at 03:18 AM
update Last Updated: December 3, 2025 at 03:18 AM
SSH Glossary
This file provides a simple explanation of technical terms related to remote server access. The search UI is provided by the application, so this file only contains a static list of terms.
SSH (Secure Shell)
Basics
This is a technology that allows you to securely control another computer over the Internet. You can use it as if you were sitting in front of that computer and operating it directly.
Example: You can work on a computer in your company office from home using SSH.
Security Key (Private Key)
Security
This is the electronic key file used to connect to the server. This file is used instead of a password to verify your identity. You should never share your security key with anyone else.
Example: The
my-server-key.pem file is your security key.
Only those with this file can connect to the server. Server
Basic
A computer that provides services to other computers. StreamGPU-created servers are high-performance computers capable of processing GPU tasks.
Port
Network
The port number through which a specific service communicates on a computer. When connecting with SSH, you must specify a port number to connect to the correct service.
Example:
-p 2222 means connect to port 2222.
Terminal
Tool
A program for entering commands using text. It's called PowerShell on Windows and Terminal on Mac and Linux.
Session
Basic
This refers to the connection to a server. If the network is disconnected, your session will end, and any running tasks may be interrupted. You can maintain your session by using tmux or screen.
File Permissions
Security
This setting determines who can read, write, and execute a file. Security Key
File permissions should be restricted so that only the owner can read them.
Example:
chmod 600 allows only the file owner to read and write. Host Key
Security
This is information like a fingerprint that verifies the authenticity of the server. When you first connect to the server,
you will be prompted to confirm the host key. If the server is trustworthy,
enter "yes."
SCP (Secure Copy)
File Transfer
This is a method of securely exchanging files using SSH.
It is used to transfer files between your local computer and a server.
Example:
scp myfile.txt user@server:~/
sends myfile.txt to the server.
ssh-keygen
Tool
A command-line tool that generates SSH key pairs (public + private).
StreamGPU provides server-side keys in some cases, but you may generate your own.
Example:
ssh-keygen -t ed25519 -C "me@example.com"
SFTP (SSH File Transfer Protocol)
File Transfer
A protocol that transfers files securely over an SSH connection. Unlike FTP,
SFTP encrypts data and supports interactive directory navigation and file
operations.
SCP vs SFTP: SCP is simple copy; SFTP is
better for browsing and managing multiple files.
icacls (Windows permission tool)
Tool
A Windows command to manage file and folder access control lists (ACLs). It
is roughly equivalent to Linux
chmod for controlling who can
read the SSH key files.
Example:
icacls key.pem /inheritance:r /grant:r "USERNAME:(R)"
PuTTYgen
Tool
A key generation and conversion tool used by the PuTTY SSH client on Windows.
Use PuTTYgen to convert a
.pem key into PuTTY's .ppk
format when required by PuTTY or Pageant.
Run PuTTYgen → Load your
.pem → Save private key (.ppk).ssh-agent / Pageant
Tool
Programs that hold your private keys in memory so you don't need to type the
key file path each time.
ssh-agent is common on Mac/Linux and
Pageant is used with PuTTY on Windows.
ssh-add ~/.ssh/streamgpu/my-key.pemknown_hosts
Security
A file that stores host keys (fingerprints) of servers you previously connected
to. On subsequent connections, the client verifies the server's host key
against this file to detect tampering. Typically located at
~/.ssh/known_hosts.
If a server is reinstalled and its host key changes, remove the matching line from
known_hosts and reconnect.tmux / screen
Tools
This program allows tasks to continue running even when the network is down.
It's useful for long-running tasks.
Port Forwarding
Network
This function connects a specific port on a server to a local computer.
It allows you to view web applications running on the server using your computer's browser.
Firewall
Security
This is a security system that blocks unauthorized access.
You can configure it to allow access only from specific IP addresses or ports.
IP address
Network
This is the address used to find your computer on the Internet.
Example:
192.168.1.100 or
203.0.113.5
Username
Default
This is the account name used to connect to the server. You must use the username displayed on the dashboard.