Secure Shell (SSH), known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely.
SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate and passwords are protected by being encrypted. SSH uses RSA public key cryptography for both connection and authentication. Encryption algorithms include Blowfish, DES, and IDEA. IDEA is the default. The SSH feature is primarily for advanced users with a working knowledge of UNIX.
If you are interested in SSH for your account please email us on support@WebHostingPeople.net .
Most Popular Articles
How to create my MySQL database?
After you are done with the database creation you can use the phpMyAdmin tool to manipulate the...
MySQL Database info: username, password, hostname, database name
Your MySQL database username - is the same as your Control Panel username. our MySQL database...
MySQL administration with phpMyAdmin
MySQL administration with phpMyAdmin NOTE: If You Have Purchased Hosting From Us Your...
MS Access
MS Access is typically used in conjunction with Windows servers running a MSSQL database. We do...
Maximum number of databases per hosting account
By default our hosting accounts come with a maximum of 50 databases per account. If for any...