By Dhruv Patel


A secure protocol that uses encrypted authentication for remote access over a network is called SSH, or Secure Shell. It enables a client to securely log into their account, communicate with other computers on the network, and execute commands. A server that is protected with SSH can connect to an SSH-enabled remote client over an unsecured connection. All primary domains of shared web hosting accounts come with free hostgator ssh.

A jailed shell environment restricts a client to a simulated root directory, which is at the top of the directory tree. This setup enables the system or host administrator to set user permissions and limit access to commands that pose a high security risk. HostGator shared web hosting accounts are enabled with jailed SSH. Users must set up port 2222 to connect to the SSH host machine, and log into their control panel with a username and password.

Jailed SSH is also available for free on the primary domains of reseller web hosting accounts. To activate SSH on multiple accounts, a once only small fee is charged per sub-account, each with its own control panel. To connect to the SSH server, port 2222 is used along with a login username and password for the control panel.

Virtual private servers (VPS) are virtual machines offered for web hosting by HostGator. Dedicated servers are also used for web hosting; these are unshared servers that are dedicated entirely to one client. Dedicated server hosting gives full permission access to the root directory, allowing the administrator to execute any type of command on their server. VPS and dedicated hosting use a port 22 connection, 'root' username, and a web host manager (WHM) password.

The SSH protocol is most commonly used on Unix based systems, though can also be used with Windows. Unlike other unsecured shell protocols, SSH does not send password and other sensitive information as plain text, which can be easily intercepted. This encryption protocol used by HostGator ensures confidentiality and data integrity over the internet.

The most common use for SSH is account login and command execution, but there are many other uses for it. SSH redirects data packets securely with port forwarding, while tunneling transfers protocol data over a secure connection or differing networks. SSH also transfers files using secure transfer protocols such as SFTP (SSH file transfer protocol) and SCP (secure copy protocol).

Authentication on SSH HostGator accounts, for both the server and client, is done with a public-key cryptography algorithm, which consists of one private key and one public key. These two keys differ, yet they share a common mathematical relationship. Public-private key pairs are automatically generated by the protocol and are used to encrypt a secure network path. The client then needs to log in with password authentication. Another method involves a public-private key pair that is manually generated to authenticate user access without a password.

Virtual private servers are vulnerable to attacks and other types of unauthorized access over the internet; SSH offers a solution to these problems by creating secure connections. All HostGator web hosting accounts have this security feature enabled for free, including shared, reseller, dedicated server and VPS accounts, giving customers confidence and peace of mind with the knowledge that their network connection and account is safe and secure.




About the Author:



0 comments