Saturday, August 9, 2014

Contact Hostgator For SSH

By Dhruv Patel


Secure Shell (SSH) is a network protocol that uses encryption for secure network services such as remote login and command execution, and data communication between two computers on a network. Using a secure channel, SSH can connect a server to a client over an insecure network, with each running its own SSH program. Hostgator ssh access is enabled on the primary domain of all hosting accounts.

A jailed shell environment restricts a client to a simulated root directory, which is at the top of the directory tree. This setup enables the system or host administrator to set user permissions and limit access to commands that pose a high security risk. HostGator shared web hosting accounts are enabled with jailed SSH. Users must set up port 2222 to connect to the SSH host machine, and log into their control panel with a username and password.

Jailed SSH is also available for free on the primary domains of reseller web hosting accounts. To activate SSH on multiple accounts, a once only small fee is charged per sub-account, each with its own control panel. To connect to the SSH server, port 2222 is used along with a login username and password for the control panel.

A virtual machine is used in HostGator VPS (virtual private server) hosting. In dedicated server hosting, the client leases an entire server for their own use. Like VPS hosting, dedicated server hosting offers default SSH access to the root directory, giving full permission to the host administrator and allowing them to make any system changes. Connection is via port 22, the username 'root', and a WHM (web host manager) password.

Unix based machines use SSH more than other types of operating systems, though Windows clients can use it, too. Unsecured shell protocols might send critical information in the form of plain text, which is easily intercepted and read by unauthorized users; SSH available on HostGator accounts uses encryption technology so that sensitive data can be sent securely over any unprotected network.

SSH has many uses in addition to logging into accounts and executing commands remotely. Tunneling is a method where protocol information can be carried from one incompatible network to another, or through a secure route in a cloud network, and is supported by SSH. This secure network protocol can also redirect data packets with port forwarding, and transfer files using secure copy protocol (SCP) and SSH file transfer protocol (SFTP).

SSH authentication on server and client HostGator accounts uses the public-key cryptography algorithm, which generates a pair of keys - one private key and one public key. These two keys share a mathematical similarity, even though they are different. SSH may generate public-private key pairs automatically for encrypting a network connection, requiring the client to authenticate with a password. Public-private key pairs may also be generated manually, in which case the user does not need a password to authenticate.

SSH provides solutions for unsecured connections in cloud computing, particularly when a virtual private server is exposed over the internet. SSH is an essential security feature that is available on all HostGator shared web hosting accounts, and on the main domain of reseller, VPS and dedicated hosting accounts.




About the Author:



No comments:

Post a Comment