From the relationship setup phase, the SSH server authenticates alone to the consumer by delivering its community vital. This permits the SSH client to verify that it is really communicating with the proper SSH server (instead of an attacker that would be posing given that the server).We at SSH safe communications between systems, automated program