I utilized SSH to switch into a virtual computer and operate on the manual board Besides this, in addition to promoting protected authenticated correspondence between two unauthenticated servers across an unreliable infrastructure, I have utilized it to funnel into the device.