Secure Shell (SSH) is a UNIX-based command interface and protocol for securely getting access to a remote computer. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate, and passwords are protected by being encrypted.
SSH allows you to connect to your server securely and perform Linux command-line operations.
SSH using sudo
For high-level tasks coupled with increased security, you can set up a sudo user instead. This user normally functions as a lower-level user, but can perform the same tasks as root when necessary.
For all examples that pertain to the root user, a sudo user can do the exact same thing by adding sudo in front of the rest of the command. You will be prompted for the root password, and then the command will execute.
Example root command:
Same command for a sudo user:
Connect to the server
Open your SSH client.
To initiate a connection, type:
If you are trying to connect as a sub-FTP user, you will want to use the following command context:
ssh subftpuser%[email protected]
Make sure you use your own domain name or IP address. If you want a user other than root, type the other username before the @ symbol.
OR (IP address version)
OR (domain FTP user version)
Be sure to replace xxx.xxx.xxx.xxx with your server's IP address. Type:
If this is your first time connecting to the server from this computer, you will see the following output. Accept the connection by typing "yes."
The authenticity of host 'example.com (188.8.131.528)' can't be established. RSA key fingerprint is 3c:6d:5c:99:5d:b5:c6:25:5a:d3:78:8e:d2:f5:7a:01. Are you sure you want to continue connecting (yes/no)? yes
You will now be prompted to enter your password. Please note that you will NOT see your cursor moving, or any characters typed (such as ******), when typing your password. This is a standard Terminal security feature. Hit enter.
You can also copy and paste, using Command+V to paste.
That's it, now you're connected to your Hosting service via SSH.
You are now logged into your Grid via SSH. You should see output like this:
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. example.com@n11:~$
You are now logged into your server via SSH. You can begin typing commands at the prompt.
The output will look something like this:
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. root@XX:~$
To connect 'to' a certain port when ssh'ing.
ssh user@remotehostip -p XXX
where xxx is the port number
That's all for this short tutorial on how to connect to a remote server via ssh from a linux shell
Licenciada en Bellas Artes y programadora por pasión. Cuando tengo un rato retoco fotos, edito vídeos y diseño cosas. El resto del tiempo escribo en MA-NO WEB DESIGN AND DEVELOPMENT.
In this short tutorial we are going to see how you can generate a new SSH key and add it to GitHub, so you can access your private repositories and…
Matrix. An open network for secure and decentralized communication that you can install in your Ubuntu server
Imagine to have an open platform that is as independent, vibrant and evolving as the Web itself, but for communication. As of June 2019, Matrix is out of beta, and the protocol…
Let’s Encrypt is an initiative to provide a better way of enabling encryption on websites. It is open, automated and above all: it offers free SSL certificates. Obtaining SSL certificates was always…
The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which…
Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and…
I recently had a request to setup SFTP for a customer so they could manage a set of files in their environment through an FTP GUI. Being an avid user…
PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program…
FTP is used to transfer files from one host to another over TCP network. This article explains how to setup FTP server on ubuntu 14.04 . There are 3 popular FTP…
Not a lot of people know about .onion websites, not many people actually use it. .ONION websites are used by people who want to stay anonymous. In addition, .onion websites…
When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools…
There are some great tools for syncing files over the internet available to us, but one stands out from the rest in regards of technology used and possible use cases. A…