You can use Secure Shell (SSH) to establish secure network connections with remote devices.
- Secure Shell (SSH) uses encryption to enable secure connections to other devices, such as a server.
- By using SSH, your data, such as passwords, user names, etc., cannot be spied on.
- SSH is not installed by default on computers running the Windows operating system. However, you can download free programs (SSH clients) with which you can use SSH. SSH is installed by default on current Linux and Apple Macintosh operating systems. If not, you can usually do this later.
- SSH is the successor of Telnet. Telnet also sends data over the Internet. However, the data is sent unencrypted, allowing third parties the potential of intercepting data.
1&1 IONOS Products with SSH Access
You can find out which of our current packages include shell access via SSH on www.ionos.com. You can check whether SSH access is available for your existing package in 1&1 IONOS under Package information.