This chapter is from the book
Summary
This chapter focused on how to remotely and securely connect with systems for the purposes of administering them, using the SSH suite of technologies and the various ssh-prefaced commands you learned about in this chapter.
You also learned about the methods for privilege elevation, or running commands or acting as another user, such as su, sudo, and pkexec.