I have used SSH to log into a remote machine and work on the command line. Besides this, I have also used it to tunnel into the system in order to facilitate secure encrypted communications between two untrusted hosts over an insecure network.