Secure Shell, commonly known as SSH, is a cryptographic network protocol used to execute commands on a remote server or to exchange information between a website hosting server and a client. Due to the fact that the info exchanged by the two sides is encrypted, a 3rd party won't be able to intercept it, which makes SSH a favored means of handling a hosting account. The commands that may be executed depend on the type of hosting service. On a shared web server, for instance, the options are limited since you will not have root access to the hosting server, so you could just create/move/delete files, create and unpack archives, import and export databases, and so on. These are all actions that are carried out inside the shared hosting account and don't require a higher level of access. Through a virtual or a dedicated server, you shall have the option to install server-side software or to restart the machine or just a particular service (web server, database server, etc.). SSH commands are submitted through a command line, and if you don't employ a UNIX-like Operating System, there are plenty of applications for other OSs, which you can use to connect to the remote server as well.
SSH Telnet in Shared Hosting
SSH access could be enabled with a mouse click via the Hepsia Control Panel if the Linux shared package which you have selected comes with this feature by default. If not, you can include it via the Add Services/Upgrades section of your CP and enable it at once. You will discover all the information and facts that you need within the SSH section of the CP - the host, the port number and the username which you have to use, alongside in depth Help articles in which we have listed the commands you can use inside the account and examples of the syntax which you have use. The SSH password can be changed from the very same section anytime with a couple of clicks. So long as SSH access is enabled, you shall also be able to connect safely through an FTP client too. With an SFTP connection, all the files you upload will go through an encrypted connection.