{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigi5glendo43q3ebstsrmxmyzurtv7aiuk5k2urlh75lgxqxxpnna",
"uri": "at://did:plc:isx5m6wiqw7ljr7tlrnkukux/app.bsky.feed.post/3mfb4hgn6cdg2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigeunxvfhfl6wi53qeiqhyj6es4v3wdz6c2hzpkque42qkeiy3atu"
},
"mimeType": "image/webp",
"size": 11418
},
"path": "/the-ssh-command-explained-secure-remote-access-tunneling-and-advanced-usage/",
"publishedAt": "2026-02-19T10:31:49.000Z",
"site": "https://www.tech2geek.net",
"tags": [
"How To",
"Linux",
"Secure Remote Access",
"SSH Command",
"Source"
],
"textContent": "The ssh command is the backbone of secure remote administration in modern IT environments. Whether you’re managing Linux servers, deploying applications, forwarding ports, or securely...\n\nSource",
"title": "The SSH Command Explained: Secure Remote Access, Tunneling, and Advanced Usage"
}