{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigi5glendo43q3ebstsrmxmyzurtv7aiuk5k2urlh75lgxqxxpnna",
    "uri": "at://did:plc:isx5m6wiqw7ljr7tlrnkukux/app.bsky.feed.post/3mfb4hgn6cdg2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigeunxvfhfl6wi53qeiqhyj6es4v3wdz6c2hzpkque42qkeiy3atu"
    },
    "mimeType": "image/webp",
    "size": 11418
  },
  "path": "/the-ssh-command-explained-secure-remote-access-tunneling-and-advanced-usage/",
  "publishedAt": "2026-02-19T10:31:49.000Z",
  "site": "https://www.tech2geek.net",
  "tags": [
    "How To",
    "Linux",
    "Secure Remote Access",
    "SSH Command",
    "Source"
  ],
  "textContent": "The ssh command is the backbone of secure remote administration in modern IT environments. Whether you’re managing Linux servers, deploying applications, forwarding ports, or securely...\n\nSource",
  "title": "The SSH Command Explained: Secure Remote Access, Tunneling, and Advanced Usage"
}