Secure Shell, also known as SSH, is a cryptographic network protocol employed to execute commands on a remote server or to exchange info between a web server and a client. Due to the fact that the info exchanged by the two sides is encoded, a third party won't be able to intercept it, which makes SSH a preferred means of handling a website hosting account. The commands that could be executed are determined by the type of hosting service. On a shared server, in particular, the options are limited because you simply won't have root access to the hosting server, so you can only create/move/delete files, set up and unpack archives, export and import databases, and so forth. They're all actions that are executed inside the shared hosting account and don't require a higher level of access. Through a virtual or a dedicated server, you'll have the ability to set up server-side software or to restart the web server or only a specific service (web server, database server, etc.). SSH commands are submitted through a command line, but if you don't employ a UNIX-like Operating System, there are tons of applications for other OSs, that you can employ to connect to the remote web server as well.

SSH Telnet in Hosting

SSH access could be enabled with a mouse click via the Hepsia Control Panel if the hosting that you've selected includes this function as standard. If not, you can add it from the Add Services/Upgrades section of your CP and enable it right away. You'll find all the details which you need within the SSH section of the Control Panel - the host, the port number and the username that you have to use, alongside thorough Help articles where we have listed all the commands which you can use inside the account and examples of the syntax that you have to use. The SSH password may be changed from the exact same section anytime with a couple of clicks. Assuming that SSH access is enabled, you'll also be able to connect safely and securely via an FTP client too. With an SFTP connection, each of the files you upload will go through an encrypted connection.