{"id":75,"date":"2021-07-05T11:56:00","date_gmt":"2021-07-05T11:56:00","guid":{"rendered":"https:\/\/zynoo.com\/blog\/?p=75"},"modified":"2025-08-15T07:13:10","modified_gmt":"2025-08-15T07:13:10","slug":"ssh-commands","status":"publish","type":"post","link":"https:\/\/zynoo.com\/blog\/ssh-commands\/","title":{"rendered":"15 Basic SSH Commands You Should Be Familiar With:"},"content":{"rendered":"\n<p><strong>SSH Commands<\/strong>:  Secure socket shell or secure shell is a network protocol. It provides a secure way of accessing a computer over an untrusted or unsecured network. It provides public-key authentication, strong password authentication, and communication between 2 computers.<\/p>\n\n\n\n<p>Besides providing strong encryption, network administrators use SSH for managing applications and systems remotely. This enables them to sign in to the other computers, execute commands, and forward files.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_SSH_Commands_works\"><\/span>How SSH Commands works?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The secure shell was designed for replacing Rlogin, Telnet, and other insecure terminal emulation. Furthermore, SSH is also used for replacing file transfer programs. For example &#8211; remote copy (RCP) and file transfer protocol (FTP).<\/p>\n\n\n\n<p>This client-server-based protocol enables a client to connect to the server. However, for issuing <strong>SSH commands<\/strong>, firstly you have to complete the authentication process.<\/p>\n\n\n\n<p>The secure shell consists of 3 layers. Namely &#8211; transport, authentication, and connection layer. Here is a detailed description of all three layers.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The transport layer &#8211;<\/strong>It ensures secure and safe communication between a server and a client. It oversees integrity protection, decryption and data encryption. Moreover, provides caching and data compression to ensure fast data exchange.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The authentication layer &#8211; <\/strong>It conducts the user authentication process and communicates its methods to the user.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The connection layer &#8211;<\/strong> It manages the communication between the different machines after authentication. The connection layer handles the closing and opening of different communication channels. In addition to it, it allows numerous channels for numerous sessions.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Uses_of_secure_shell\"><\/span>Uses of secure shell<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>SSH connections are used for securing various types of communication between a remote host and a local machine. It includes &#8211; remote execution of commands, secured remote access to the resources, delivery of software patches, and various other administrative management and administrative tasks.<\/p>\n\n\n\n<p>The uses of SSH are not limited to creating a trusted channel between remote and local computers. It is also used for server hardware, managing routers, and file transfer applications.<\/p>\n\n\n\n<p>SSH keys are employed for automating access to the servers. They are used in configuration management, scripts, and backup systems. A user can use SSH with an ordinary password and ID. Some important uses of SSH are &#8211; it ensures remote connections, manages a trusted file transfer protocol, tunneling for data transfer, and network management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Capabilities_of_SSH\"><\/span>Capabilities of SSH<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>SSH is used in various software and scripts for enabling systems and programs to securely and remotely access data and other information. It includes the following functions &#8211;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure file transfer session<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automated file transfer<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Safe remoteaccess to SSH-enabled devices and network systems.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure delivery of commands on systems and remote devices.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Control of network infrastructure components.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"History_of_SSH\"><\/span>History of SSH<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Its first version was designed by Tatu Ylonen in 1995. During that time, he was a researcher and later started SSH communication security. Over time, various issues have been found in SSH 1, and the version is considered unsafe.<\/p>\n\n\n\n<p>SSH-2 was adopted in 2006 by the IETF (internet engineering task force) as a standards-track specification. It uses a stronger integrity check and Diffie-Hellman key exchange for improving security. Various encryption methods such as &#8211; Blowfish and Advanced Encryption Standard, can be used by the SSH servers and clients.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Basic_SSH_Commands_and_their_Description\"><\/span>The Basic SSH Commands and their Description:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">SSH Commands<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\">cat<\/td><td>print the content to the screen<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">cd-<\/td><td>change directory<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">cd..<\/td><td>go up<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">cp<\/td><td>copy a file<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">du<\/td><td>show disk usage<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">file*<\/td><td>print a list of all the directories\/files in the directory.<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">kill<\/td><td>terminate a system process<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">last<\/td><td>show the names and timings of who logged in<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">last-20<\/td><td>displays the last 20 logins<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">In<\/td><td>create a link between directories and files<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">netstat<\/td><td>shows current network connections<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">pico<\/td><td>friendly file editor<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">ps aux<\/td><td>shows system processes<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">rm<\/td><td>delete a fil<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">rm-rf tmp\/<\/td><td>deletes the directory and all files and subdirectories in it<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Is_it_possible_to_put_SSH_commands_together\"><\/span>Is it possible to put SSH commands together?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Yes, it is possible. A majority of times you wish to use different commands on a specific line. Here, are some examples for achieving your goal.<\/p>\n\n\n\n<p><strong>|<\/strong>character is known as a pipe. It takes a date from any program and pipes it to the other. Similarly, &gt; means the creation of a new file, &gt;&gt; refers to append data to a file and &lt; means to send input into a command.<\/p>\n\n\n\n<p>After logging in to your <a href=\"https:\/\/zynoo.com\/vps-hosting.html\" target=\"_blank\" rel=\"noreferrer noopener\">VPS server<\/a> by putty, numerous SSH Commands are available for monitoring and managing its resources. Have a glance at the 4 of them.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Create a new file<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Touch command will enable you to create a new file. The timestamp of the file will be updated by the command if it already exists.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Edit a file<\/strong><\/li>\n<\/ul>\n\n\n\n<p>For making required changes to the file, use the nano command for launching a text editor. For removing one or multiple files on the server use the rm command.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><tbody><tr><td>rm filename<\/td><td>for removing a file<\/td><\/tr><tr><td>rm-r directory name\/<\/td><td>remove files of the directory from the server<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Create a new directory<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Create a directory with the <strong>mkdir <\/strong>command.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><tbody><tr><td>mkdir assignment<\/td><td>create a directory known as the assignment<\/td><\/tr><tr><td>mkdir-p assignment<\/td><td>create a directory name assignment even if it already exists.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Modify the working directory<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Use the cd command for navigating the filesystem of your server.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-regular\"><table><tbody><tr><td>cd\/path\/to\/your\/directory\/<\/td><td>The current directory can be changed to the nominated path.<\/td><\/tr><tr><td>cd~<\/td><td>navigate to the home directory<\/td><\/tr><tr><td>cd..<\/td><td>navigate to the parent of the current directory<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Final_thoughts\"><\/span>Final thoughts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>SSH stands as the remote administration protocol for modifying and controlling your remote servers. For secure transferring of information, SSH uses 3 types of encryptions &#8211; symmetrical, asymmetrical, and hashing.<\/p>\n\n\n\n<p>A majority of people think that <strong>SSH commands<\/strong> are complex. However, they are easy to use and understand. Above we discussed its uses and importance in detail to understand the security aspects of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Secure_Shell_Protocol\" target=\"_blank\" rel=\"noreferrer noopener\">SSH<\/a>.<\/p>\n\n\n\n<p>As you know, learning SSH commands is important for managing VPS. So, we have also discussed the description of 15 basic commands that are important for a webmaster.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SSH Commands: Secure socket shell or secure shell is a network protocol. It provides a secure way of accessing a&#8230;<\/p>\n","protected":false},"author":1,"featured_media":81,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[19,18,20,11],"class_list":["post-75","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials","tag-centos-commands","tag-linux-commands","tag-putty-commands","tag-ssh-commands"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>15 Basic SSH Commands You Should Be Familiar With:<\/title>\n<meta name=\"description\" content=\"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zynoo.com\/blog\/ssh-commands\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"15 Basic SSH Commands You Should Be Familiar With:\" \/>\n<meta property=\"og:description\" content=\"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zynoo.com\/blog\/ssh-commands\/\" \/>\n<meta property=\"og:site_name\" content=\"Zynoo Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-05T11:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T07:13:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"636\" \/>\n\t<meta property=\"og:image:height\" content=\"352\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamie Collins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"15 Basic SSH Commands You Should Be Familiar With:\" \/>\n<meta name=\"twitter:description\" content=\"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie Collins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/\"},\"author\":{\"name\":\"Jamie Collins\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#\\\/schema\\\/person\\\/075b85b8be75fb370da34891a96e7eba\"},\"headline\":\"15 Basic SSH Commands You Should Be Familiar With:\",\"datePublished\":\"2021-07-05T11:56:00+00:00\",\"dateModified\":\"2025-08-15T07:13:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/\"},\"wordCount\":983,\"publisher\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ezgif-7-2ba5a803af7f.jpg\",\"keywords\":[\"centos commands\",\"linux commands\",\"PuTTY Commands\",\"ssh commands\"],\"articleSection\":[\"Web Hosting Tutorials\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/\",\"url\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/\",\"name\":\"15 Basic SSH Commands You Should Be Familiar With:\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ezgif-7-2ba5a803af7f.jpg\",\"datePublished\":\"2021-07-05T11:56:00+00:00\",\"dateModified\":\"2025-08-15T07:13:10+00:00\",\"description\":\"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ezgif-7-2ba5a803af7f.jpg\",\"contentUrl\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/ezgif-7-2ba5a803af7f.jpg\",\"width\":636,\"height\":352,\"caption\":\"ssh commands\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/ssh-commands\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"15 Basic SSH Commands You Should Be Familiar With:\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/\",\"name\":\"Zynoo Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#organization\",\"name\":\"Zynoo.com\",\"url\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/logo.png\",\"width\":149,\"height\":31,\"caption\":\"Zynoo.com\"},\"image\":{\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/#\\\/schema\\\/person\\\/075b85b8be75fb370da34891a96e7eba\",\"name\":\"Jamie Collins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c9359158623ddee86ac8561e84de70f78b722c1d9018dd61d611ae19118a2d76?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c9359158623ddee86ac8561e84de70f78b722c1d9018dd61d611ae19118a2d76?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c9359158623ddee86ac8561e84de70f78b722c1d9018dd61d611ae19118a2d76?s=96&d=mm&r=g\",\"caption\":\"Jamie Collins\"},\"description\":\"Jamie Collins is a content writer with over 5+ years of experience in web hosting. He specializes in creating simple, practical guides that help readers understand hosting and make smarter online choices.\",\"sameAs\":[\"https:\\\/\\\/zynoo.com\\\/blog\\\/\"],\"url\":\"https:\\\/\\\/zynoo.com\\\/blog\\\/author\\\/willy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"15 Basic SSH Commands You Should Be Familiar With:","description":"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zynoo.com\/blog\/ssh-commands\/","og_locale":"en_US","og_type":"article","og_title":"15 Basic SSH Commands You Should Be Familiar With:","og_description":"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.","og_url":"https:\/\/zynoo.com\/blog\/ssh-commands\/","og_site_name":"Zynoo Blog","article_published_time":"2021-07-05T11:56:00+00:00","article_modified_time":"2025-08-15T07:13:10+00:00","og_image":[{"width":636,"height":352,"url":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg","type":"image\/jpeg"}],"author":"Jamie Collins","twitter_card":"summary_large_image","twitter_title":"15 Basic SSH Commands You Should Be Familiar With:","twitter_description":"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.","twitter_image":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg","twitter_misc":{"Written by":"Jamie Collins","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#article","isPartOf":{"@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/"},"author":{"name":"Jamie Collins","@id":"https:\/\/zynoo.com\/blog\/#\/schema\/person\/075b85b8be75fb370da34891a96e7eba"},"headline":"15 Basic SSH Commands You Should Be Familiar With:","datePublished":"2021-07-05T11:56:00+00:00","dateModified":"2025-08-15T07:13:10+00:00","mainEntityOfPage":{"@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/"},"wordCount":983,"publisher":{"@id":"https:\/\/zynoo.com\/blog\/#organization"},"image":{"@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg","keywords":["centos commands","linux commands","PuTTY Commands","ssh commands"],"articleSection":["Web Hosting Tutorials"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/","url":"https:\/\/zynoo.com\/blog\/ssh-commands\/","name":"15 Basic SSH Commands You Should Be Familiar With:","isPartOf":{"@id":"https:\/\/zynoo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#primaryimage"},"image":{"@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg","datePublished":"2021-07-05T11:56:00+00:00","dateModified":"2025-08-15T07:13:10+00:00","description":"Learn how to navigate and use Linux-based files. A list of fundamental SSH commands and examples of how to use them will be shown.","breadcrumb":{"@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zynoo.com\/blog\/ssh-commands\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#primaryimage","url":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg","contentUrl":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2021\/07\/ezgif-7-2ba5a803af7f.jpg","width":636,"height":352,"caption":"ssh commands"},{"@type":"BreadcrumbList","@id":"https:\/\/zynoo.com\/blog\/ssh-commands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zynoo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"15 Basic SSH Commands You Should Be Familiar With:"}]},{"@type":"WebSite","@id":"https:\/\/zynoo.com\/blog\/#website","url":"https:\/\/zynoo.com\/blog\/","name":"Zynoo Blog","description":"","publisher":{"@id":"https:\/\/zynoo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zynoo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zynoo.com\/blog\/#organization","name":"Zynoo.com","url":"https:\/\/zynoo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zynoo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2025\/08\/logo.png","contentUrl":"https:\/\/zynoo.com\/blog\/wp-content\/uploads\/2025\/08\/logo.png","width":149,"height":31,"caption":"Zynoo.com"},"image":{"@id":"https:\/\/zynoo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/zynoo.com\/blog\/#\/schema\/person\/075b85b8be75fb370da34891a96e7eba","name":"Jamie Collins","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c9359158623ddee86ac8561e84de70f78b722c1d9018dd61d611ae19118a2d76?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c9359158623ddee86ac8561e84de70f78b722c1d9018dd61d611ae19118a2d76?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c9359158623ddee86ac8561e84de70f78b722c1d9018dd61d611ae19118a2d76?s=96&d=mm&r=g","caption":"Jamie Collins"},"description":"Jamie Collins is a content writer with over 5+ years of experience in web hosting. He specializes in creating simple, practical guides that help readers understand hosting and make smarter online choices.","sameAs":["https:\/\/zynoo.com\/blog\/"],"url":"https:\/\/zynoo.com\/blog\/author\/willy\/"}]}},"_links":{"self":[{"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/posts\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":0,"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/posts\/75\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/media\/81"}],"wp:attachment":[{"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/media?parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/categories?post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zynoo.com\/blog\/wp-json\/wp\/v2\/tags?post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}