Secure Shell, commonly known as SSH, is a cryptographic network protocol used to execute commands on a remote server or to exchange information between a server and a client. Given that the info exchanged by the two sides is protected, a third party cannot intercept it, which makes SSH an ideal means of controlling a web hosting account. The commands which could be executed are determined by the type of hosting service. On a shared server, for instance, the alternatives are limited as you will not have root access to the hosting server, so you can only create/move/delete files, create and unpack archives, import and export databases, etcetera. They are all actions which are executed within the shared hosting account and don't need a higher level of access. By using a virtual or a dedicated server, you'll have the ability to set up server-side software or to restart the hosting server or just a certain service (web server, database server, etc.). SSH commands are submitted with a command line, but if you don't use a UNIX-like Operating System, there are a number of applications for other OSs, that you can use to connect to the remote server as well.

SSH Telnet in Cloud Web Hosting

SSH access could be permitted with a click via the Hepsia Control Panel if the Linux cloud web hosting that you have selected provides this feature as standard. If not, you could add it using the Add Services/Upgrades section of your CP and enable it immediately. You'll discover all the information and facts which you need inside the SSH section of the Control Panel - the host, the port number and the username which you have to use, as well as thorough Help articles in which we have listed all the commands you can use in the account and examples of the syntax you have to use. The SSH password can be changed from the very same section anytime with a few clicks. Assuming that SSH access is enabled, you will also be able to connect safely and securely using an FTP client too. With an SFTP connection, each of the files that you upload shall go through an encrypted connection.