...Upon receipt of that connection attempt, sshd responds by asking the initiator of the connection to authenticate with the system. If this authentication is successful, sshd presents a working environment where the initiator can do most anything with the system while maintaining the same security... (read more)