Create your premium account according to the region do you want.
a cryptographic network protocol for secure data communications, command line login interfaces, remote execution commands, and other network services between two computer networks. This is connected, through secure channels or through insecure networks, the server and client run the SSH and SSH server client programs respectively. The protocol specification istinguishes between the two main versions referred to as SSH-1 and SSH-2. The encryption used by SSH is assigned to provide confidentiality and integrity data through insecure networks, such as the Internet.