Implementing Ssh Strategies For Optimizing The Secure Shell