Currently set to Index
Currently set to Follow

How To Connect To Your Server Using SSH

SSH is about as cool as sliced bread, if maybe not a little bit more so. Seriously, it’s a great way to get at your server’s terminal shell, which—as we all know—is the hotbed of power. From there you can change just about any aspect of the server, not to mention seriously screw things up if you don’t know what you’re doing.

“Secure Shell (SSH) is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client (running SSH server and SSH client programs, respectively) — https://en.wikipedia.org/wiki/Secure_Shell.”

Regardless of your skill level or knowledgeability, if you’re going to do any serious web mastering with your server, you’ll need to access the server shell at some point. To do this, you’ll need to tunnel commands server-side via SSH. There are several ways to accomplish this, but each operating system treats the process slightly differently. Lucky for you, we’ve got a common way to get at your server via SSH for all three major operating systems. No need to thank us, though: This is by no means a comprehensive methods list, but rather just a quick guide to dipping your toe in the water. For more complex entry methods, hit up the Big-G and google it.

RELATED:   Top Four Reasons to use Cube Panel

In the meantime, though, check below for our ways of getting to your server via SSH!

SSH Access For Windows

Windows is complicated, and because of that, we’ll get it out of the way quick. Windows, unlike Linux or Macintosh (which we’ll look at in just a second) is not based on UNIX, and does not come stock with any kind of SSH client. However, there are plenty of utilities out there that will get the job done. Without sending you to a search engine, though, you can use our favorite in the meantime: PuTTY.

putty ssh

This handy application provides a pleasant enough graphical interface from which to get at your server. Just enter the name of the host, then choose SSH as your connection type. If you’d like, you can save the information for further use. Then enter your username and password, and PuTTY should do the rest.

RELATED:   The Relationship Between eCommerce Web Hosting and Internet Security

Download PuTTY at https://www.chiark.greenend.org.uk/~sgtatham/putty/download.html.

For Linux

Linux, by nature of its internal coding, is much less of a pain in the derriere. All you have to do is locate your local terminal application (this varies from distro to distro, so look carefully) and then type the following string:

[code lang=”shell”]
ssh -l your-username yourserver-or-ip.com
[/code]

For Macintosh

ssh mac terminal

For Mac users, enter the same command as above, only use the native Terminal application, which can be found in your Utilities folder. Easy as pie, right?

Basic SSH Commands

Here is a short list of some of the most common SSH commands.

[code lang=”shell”]
<command> -h # The -h flag provides help on a command
ls # List the contents of the current directory
cd <directory or full path> # Change to that directory or path
cp <source> <destination> # Copy the source file to the destination
cp -r <source> <destination> # Copy the source directory to the destination directory
mv <source> <destination> # Move the source file to the destination
mkdir <directory name> # Create a new directory
pico <file> # Edit file in a friendly, easy to use file editor
grep <text> <file> # Search for text within a file
wget <URI> # Download the file at the given URI to the current path
tar -xz -f <file> # Un-gzip and un-tar the given *.tgz or *.tar.gz file
rm <file> # Delete the file
rm -r <directory> # Delete the directory and all contents
killall <program name> # Kill all running processes of the program
ps # Show running processes
top # Show running processes in a graphical frontend
netstat # Show all current network connections
du # Show disk usage
[/code]

RELATED:   False User Authentication: A Common Hacking Tactic

For more SSH commands check David Coe‘s https://www.sshcommands.co.uk/, an easy to understand list of SSH commands (with examples).

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

Feeling Insecure In Your Current Job Position?
Feeling Insecure In Your Current Job Position?

Job security is one of our primary concerns. We everyday we live with the question of whether or not we will be working the next day. Loyalty is not the...

Leave a Reply

Your email address will not be published. Required fields are marked *