Reading Time: 3 minutes. This functionality to remotely connect to another computer is embedded into the Windows Operating system. Windows allows you to use VPS hosting to log in to the server as an administrator. Therefore, you can access a huge number of functionalities and make lots of changes to the server. So, first, activate your Windows VPS to find all these features right at the end of this tutorial. However, other operating systems or devices work similarly. Check your email inbox and look for an email from RouterHosting containing the login details for logging into your server:. Enter the IP address a four-part address number similar to
Was this information helpful?
Connecting to Your Linux Instance Using SSH
Deploy websites rapidly on our secure, high-performance cloud. Secure your domains and apps with commercial-grade encryption. Enterprise software delivered on- demand, with free technical support. Need a Linux box? What is a VPS?
Where would you like to share this to?
Use the following command to set the file permissions so that only you can read the file:. For Ubuntu images, the default username is ubuntu. If the instance uses a key pair that was generated by Oracle Cloud Infrastructure , use the following procedure. If this is the first time you are using this key pair, you must set the file permissions so that only you can read the file.
Get the latest tutorials on SysAdmin and open source topics. Hub for Good Supporting each other to make an impact. Write for DigitalOcean You get paid, we donate to tech non-profits. If your headless, or remote, VPS is visible over the Internet, you should use public key authentication instead of passwords, if at all possible. This is because SSH keys provide a more secure way of logging in compared to using a password alone. While a password can eventually be cracked with a brute-force attack , SSH keys are nearly impossible to decipher by brute force alone. With public key authentication, every computer has i a public and ii a private "key" two mathematically-linked algorithms that are effectively impossible to crack. Key-based authentication is the most secure of several modes of authentication usable with OpenSSH, such as plain passwords and Kerberos tickets. Other authentication methods are only used in very specific situations. Both of these were considered state-of-the-art algorithms when SSH was invented, but DSA has come to be seen as less secure in recent years.