What precisely is SSH? How will you manage a server via SSH?
Secure Shell, also known as SSH, is a cryptographic network protocol that is used to execute commands on a remote machine or to exchange information between a website hosting server and a client. As the information exchanged by the two sides is protected, a third party won't be able to intercept it, which makes SSH a preferred means of controlling a hosting account. The commands that could be executed depend on the type of hosting service. On a shared hosting server, for example, the options are limited because you won't have root access to the web server, so you may simply create/move/delete files, set up and unpack archives, export and import databases, and so forth. They are all actions that are performed in the shared hosting account and do not require a higher level of access. Using a virtual or a dedicated server, you shall be able to set up server-side software or to restart the server or just a particular service (web server, database server, etc.). SSH commands are submitted via a command line, and if you don't use a UNIX-like Operating System, there are a number of apps for other OSs, you can use to connect to the remote web server as well.
SSH Telnet in Cloud Web Hosting
SSH access can be allowed with a click from the Hepsia Control Panel if the cloud web hosting that you have chosen includes this feature as standard. If not, you can include it via the Add Services/Upgrades section of your CP and enable it instantly. You'll find all the details which you need within the SSH section of the Control Panel - the host, the port number and the username which you need to use, along with in depth Help articles where we have listed all of the commands that you can use within the account and examples of the syntax you have to use. The SSH password can be modified from the very same section anytime with several clicks. Assuming that SSH access is enabled, you will also be able to connect safely and securely via an FTP client as well. With an SFTP connection, each of the files that you upload will go through an encrypted connection.