Monday, 4 August 2014

Configure SSH On Hostgator

By Dhruv Patel


A secure protocol that uses encrypted authentication for remote access over a network is called SSH, or Secure Shell. It enables a client to securely log into their account, communicate with other computers on the network, and execute commands. A server that is protected with SSH can connect to an SSH-enabled remote client over an unsecured connection. All primary domains of shared web hosting accounts come with free hostgator ssh.

A jailed shell environment restricts a client to a simulated root directory, which is at the top of the directory tree. This setup enables the system or host administrator to set user permissions and limit access to commands that pose a high security risk. HostGator shared web hosting accounts are enabled with jailed SSH. Users must set up port 2222 to connect to the SSH host machine, and log into their control panel with a username and password.

Reseller web hosting accounts have jailed SSH enabled for free on primary domains. A client is charged a small one time fee for each additional domain that requires SSH. Each sub-account gets a separate control panel with its own login details. Port 2222 must be set up to establish a secure connection with the SSH enabled host server.

A VPS, or virtual private server, is a virtual machine provided as a service by HostGator. VPS hosting, along with dedicated server hosting, where the customer has an entire server not shared with other customers, provides automatic SSH access to their root directory with full permission to make any changes they want on their own server. This kind of hosting requires port 22 to connect securely to the server, the username 'root' and a web host manager password.

Unix based machines use SSH more than other types of operating systems, though Windows clients can use it, too. Unsecured shell protocols might send critical information in the form of plain text, which is easily intercepted and read by unauthorized users; SSH available on HostGator accounts uses encryption technology so that sensitive data can be sent securely over any unprotected network.

The most common use for SSH is account login and command execution, but there are many other uses for it. SSH redirects data packets securely with port forwarding, while tunneling transfers protocol data over a secure connection or differing networks. SSH also transfers files using secure transfer protocols such as SFTP (SSH file transfer protocol) and SCP (secure copy protocol).

Authentication on SSH HostGator accounts, for both the server and client, is done with a public-key cryptography algorithm, which consists of one private key and one public key. These two keys differ, yet they share a common mathematical relationship. Public-private key pairs are automatically generated by the protocol and are used to encrypt a secure network path. The client then needs to log in with password authentication. Another method involves a public-private key pair that is manually generated to authenticate user access without a password.

Virtual private servers are vulnerable to attacks and other types of unauthorized access over the internet; SSH offers a solution to these problems by creating secure connections. All HostGator web hosting accounts have this security feature enabled for free, including shared, reseller, dedicated server and VPS accounts, giving customers confidence and peace of mind with the knowledge that their network connection and account is safe and secure.




About the Author:



No comments:

Post a Comment