Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility

Size: px
Start display at page:

Download "Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility"

Transcription

1 Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility

2 Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config file SFTP, SCP, and file transfer Porting X11 session to your local machine Modules

3 SSH - What is it? SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer. Allows users to securely log into another computer over an insecure network, executes commands and transfers files Created as a replacement for telnet, ftp, rlogin, rsh, and rcp SSH traffic is always encrypted, which makes it safer Usually communicates on port 22, but it can use any port you specify

4 SSH SSH Components SSH Always has a Client and a Host Client - the machine you are sitting in front of A client needs a program, called an SSH client, to connect to another machine via SSH. Host - the server you want to connect to A host is any machine listening for SSH connections. It runs a program called SSHD that waits for SSH connections. When your client sends a request to connect, SSHD handles the negotiation that lets you log in.

5 SSH - Authentication SSH has two common methods of authentication: Password authentication Not as secure as key authentication Easier to set up Key authentication Vastly more secure than password authentication Difficult to set up Easier to use once set up

6 SSH - Key Pair Definition SSH keys are a matching set of cryptographic keys which can be used for authentication. Each set contains a public and a private key. The public key can be shared freely without concern. The private key must be vigilantly guarded and never exposed to anyone. The private key is effectively your password A little later on we will generate a key pair and use it to login to a server

7 SSH - Features SSH is available on most platforms Clients are available for many platforms: Windows, Mac, Unix, Linux, iphone, Android, etc. Free for noncommercial use SSH can multiplex services over the same connection That means you can open an SSH connection and send other kinds of traffic through it One of the most powerful functions of multiplexing is port forwarding or tunneling SSH can securely tunnel insecure applications like POP3, SMTP, IMAP, and CVS.

8 SSH - Connect to a remote host We are going to use shell01.seas.gwu.edu for our remote host in this class To connect: ssh username@shell01.seas.gwu.edu enter your account password To disconnect: type "exit" at the prompt You can daisy chain connections from one host to another ssh username@shell.seas.gwu.edu (from shell01)

9 SSH - Useful commands when connected You can sometimes forget which machine you are connected to. Tips to find out where you are: look at the prompt type hostname type uname -a

10 SSH - Remote Terminal Exercise A big advantage of SSH is the ability to remotely control a machine without having physical access to it. Exercise: Make sure you are disconnected from shell01.seas.gwu.edu From your terminal, type /bin/uname -a What server name pops up? Type ssh username@shell01.seas.gwu.edu /bin/uname -a Enter your password and answer yes to any questions What server name pops up?

11 SSH - The.ssh Directory Inside your home folder, you can create a special folder named.ssh to hold your SSH configuration files and key pairs. Create your own.ssh directory: 1. cd ~ 2. mkdir.ssh 3. chmod u+rwx,g-rwx,o-rwx.ssh You change permissions on the.ssh directory because it can hold your private key, which is just like a password!

12 SSH -.ssh Directory Files Most.ssh directories have configuration files in them. These are some common ones: config - holds configuration information for connecting to specific hosts. authorized_keys - holds public keys for accounts that are allowed to authenticate. If a public key and a private key match, then that account can authenticate known_hosts - a file that holds keys of servers you have connected to. If a server's key has changed, you will be warned when you connect. id_rsa.pub - a public key file id_rsa - a private key file

13 SSH - Generate a key pair Let's generate your key pair! 1. Make sure you are logged out from shell01 (check your prompt) 2. cd ~/.ssh 3. ssh-keygen -t rsa -b C "username@gwu.edu" a. rsa is the algorithm for encryption b. -b is the number of bits for your key c bits is 512 bytes, or the equivalent of a 512 character password!

14 SSH - Lets look at your keys Your keys will appear to be gibberish, but they are magic! cd ~/.ssh cat id_rsa - this is your private key cat id_rsa.pub - this is your public key

15 SSH - Create your authorized_keys file If a public key is added to the authorized_keys file, then a user with the corresponding private key can login to that account cd ~/.ssh touch authorized_keys cat id_rsa.pub >> authorized_keys chmod u+rw,g-rwx,o-rwx authorized_keys

16 SSH - Create your config file You can force key authentication for a server by creating a config file cd ~/.ssh nano config, then type: Host shell01 Hostname shell01.seas.gwu.edu PreferredAuthentications publickey User <username> Save the file

17 SSH - Login to Shell01 with your key If configured correctly, you can now SSH to shell01 without having to enter a password. ssh shell01 This is the shortcut you created in your config file

18 SSH - SFTP The SSH File Transfer Protocol (SFTP) enables secure file transfer capabilities between networked hosts. All SFTP traffic is encrypted FTP (File Transfer Protocol) is insecure. SFTP, like SSH, requires a client and a host (server). You authenticate with the same credentials you use for SSH

19 SSH - SFTP command line client SFTP can be used at the command line on linux machines and some Apple machines. You can launch it by typing: sftp username@shell01.seas.gwu.edu Use? for help Regular commands occur on the remote server. ls, pwd, cd, etc. To work on your local machine, prepend the letter l to the commands: lpwd, lls, lcd, etc. Use "put" to transfer files TO the server Use "get" to transfer files FROM the server

20 SSH - SFTP GUI Clients Using the command line SFTP client is confusing, frustrating, and inconvenient. There are many free SFTP utilities for Windows, Apple, and Linux machines. GUI clients are easy to use and necessary if you will transfer a large amount of folders or files between machines. Windows Filezilla - Apple Cyberduck - Linux Filezilla -

21 SSH - Secure Copy (SCP) The scp command securely copies files and directories between remote hosts without starting an FTP session or logging into the remote systems explicitly. The scp command uses SSH to transfer data, so it requires a password or passphrase for authentication. Usage: scp Source Destination scp user@host1:file1 user@host2:file2 host1 or host2 can be your local workstation or the server You do not need to include the user@host* section when referring to your local workstation. Just the path is OK

22 SSH - SCP Examples SCP is good for moving one or two files quickly. Move a file FROM a server TO your workstation: scp username@shell01:/tmp/class_example.txt /homedirectory/ Move a file TO a server FROM your workstation: scp /homedirectory/class_example.txt username@shell01.seas.gwu.edu:/tmp/username.txt In the second example, we are renaming the file so the whole class doesn't try to write the same file name at the same time.

23 SSH - SCP Examples SCP is good for moving one or two files quickly. Move a file FROM a server TO your workstation: scp username@shell01:/tmp/class_example.txt ~/ Move a file TO a server FROM your workstation: scp ~/class_example.txt username@shell01.seas.gwu.edu:/tmp/username.txt In the second example, we are renaming the file so the whole class doesn't try to write the same file name at the same time.

24 SSH - X Windows X or XWindows was designed from the beginning to be network-centric, and adopts a "client-server" model. It provides a Graphical User Interface for Linux applications. An X "client" is usually an application written with X libraries, like Matlab or your Window Manager that makes up your desktop The X Server draws what you see on the screen and manages the keyboard and mouse. When you run an application remotely, your workstation is running the X Server.

25 SSH - X Windows X or XWindows was designed from the beginning to be network-centric, and adopts a "client-server" model. It provides a Graphical User Interface for Linux applications. An X "client" is usually an application written with X libraries, like Matlab or your Window Manager that makes up your desktop The X Server draws what you see on the screen and manages the keyboard and mouse. When you run an application remotely, your workstation is running the X Server.

26 SSH - X Windows Architecture

27 SSH - X Windows Forwarding Requirements X Window Forwarding refers to sending the display of a program from one machine to another. Forwarding requires a small program to run on machines without a native X Server if you want to port the display to your workstation. Windows and OS X do not have a native X Server built in Most linux builds have an X Server built in

28 SSH - X Windows Server programs Windows X Ming (use with Putty) - MobaxTerm (Easier) - Apple OS X XQuartz - XQaurtz may require you to install the Apple OS X SDK from the Apple Store (free download) Linux An X Server is usually installed with the OS

29 SSH - X Window Forwarding Connection You need to tell your SSH session that you want to forward X traffic from the machine you are connecting to. Windows Your SSH client will have a checkbox somewhere that says "Forward X traffic" In Putty it is under the Connection/SSH/X11 menu If you use Putty, you have to launch XMing manually Apple OS X ssh -X username@server (this will automatically launch XQuartz) Linux ssh -X username@server

30 SSH - X Window Forwarding Exercise Use your linux workstation to start an X connection to shell01 From the terminal: 1. ssh -X username@shell01.seas.gwu.edu 2. type xeyes 3. Close xeyes 4. type xclock 5. close xclock 6. type xterm 7. In the xterm window, type hostname 8. close xterm

31 Modules Modules are small scripts that run and configure your linux environment so it can run a specific program. Modules load an environment so a program can run correctly. SEAS uses modules on Shell01 for Matlab, anysys, Comsol, and other programs. Modules do not install a program, they only configure your environment. Modules can be loaded simultaneously with other modules. Modules can be requested for shell01 via support@ticket.seas.gwu.edu Modules can be requested for Colonial One via hpchelp@gwu.edu

32 Modules - Module commands module avail - show available modules module list - show loaded modules module load - load a module module unload - unload a module

33 Modules - Module syntax Use module avail to see a list of modules you can load. Use the full name of the module to prevent confusion since there may be more than one version of a program available. module avail results: abaqus/abaqus_v comsol/comsol_5.1_fnl matlab/r2015b pgi/10.5 anaconda/anaconda3 comsol/comsol_5.2_ckl mpi/compat-openmpi-psm-x86_64 silvaco/tcad2015 ansys/ansys16.2 comsol/comsol_5.2_fnl mpi/compat-openmpi-x86_64 tecplot/tecplot360ex_2014

34 Modules - Module Exercise Use module load to load files. Remember to use the full name of the module! ssh -X username@shell01.seas.gwu.edu Before you load the module: type runwb2. What happens? type module load ansys/ansys16.2 Now type runwb2 again. What happens? Choose File Exit and close Ansys workbench type printenv then find the entry in your PATH variable that lets you load Ansys type module unload ansys/ansys16.2 Type printenv again and see if the ansys entry is in your PATH variable

Project #6: Using ssh, scp and sftp with Key-Based Authentication

Project #6: Using ssh, scp and sftp with Key-Based Authentication Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our

More information

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA

More information

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

2-1-1 ssh Secure SHell

2-1-1 ssh Secure SHell 2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup 1 Communicate Safely with Remote Systems 2 What is Safely Authentication I am Assured of Which Host I am Talking

More information

Bitnami Apache Solr for Huawei Enterprise Cloud

Bitnami Apache Solr for Huawei Enterprise Cloud Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,

More information

ssh and handson Matsuzaki maz Yoshinobu 1

ssh and handson Matsuzaki maz Yoshinobu  1 ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted

More information

Configuring SSH Public Key Authentication

Configuring SSH Public Key Authentication 6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running

More information

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

2-1-1 ssh Secure SHell

2-1-1 ssh Secure SHell 2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup Communicate Safely with Remote Systems What is Safely Authentication I am Assured of Which Host I am Talking

More information

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows

More information

Telnet/SSH. Connecting to Hosts. Internet Technology 1

Telnet/SSH. Connecting to Hosts. Internet Technology 1 Telnet/SSH Connecting to Hosts Internet Technology 1 What is Telnet? Method for connecting to hosts Enables remote login (rlogin) to computers on the Internet One computer can connect to another to use

More information

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers

More information

TELE301 Lab16 - The Secure Shell

TELE301 Lab16 - The Secure Shell TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................

More information

Unit: Making a move (using FTP)

Unit: Making a move (using FTP) Data Introduction to Unix and HPC (HPC for Wimps) Unit: Making a move (using FTP) Goals: Can login via Secure FTP and see home directory. Can transfer a file from local machine via FTP to home directory.

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH

More information

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers

More information

Bitnami MEAN for Huawei Enterprise Cloud

Bitnami MEAN for Huawei Enterprise Cloud Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable

More information

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal

More information

Using a Linux System 6

Using a Linux System 6 Canaan User Guide Connecting to the Cluster 1 SSH (Secure Shell) 1 Starting an ssh session from a Mac or Linux system 1 Starting an ssh session from a Windows PC 1 Once you're connected... 1 Ending an

More information

sftp - secure file transfer program - how to transfer files to and from nrs-labs

sftp - secure file transfer program - how to transfer files to and from nrs-labs last modified: 2017-01-20 p. 1 CS 111 - useful details: ssh, sftp, and ~st10/111submit You write Racket BSL code in the Definitions window in DrRacket, and save that Definitions window's contents to a

More information

Secure Shell Commands

Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

Secure Shell Commands

Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

User Guide Version 2.0

User Guide Version 2.0 User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...

More information

No More Passwords (with SSH)

No More Passwords (with SSH) No More Passwords (with SSH) Ted Dustman March 30, 2009 Contents 1 Introduction 1 1.1 Local or Remote?................................. 1 1.2 SSH Command Set................................ 1 2 Authentication

More information

New User Tutorial. OSU High Performance Computing Center

New User Tutorial. OSU High Performance Computing Center New User Tutorial OSU High Performance Computing Center TABLE OF CONTENTS Logging In... 3-5 Windows... 3-4 Linux... 4 Mac... 4-5 Changing Password... 5 Using Linux Commands... 6 File Systems... 7 File

More information

An Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017

An Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017 An Overview of SSH Presentation to Linux Users of Victoria Melbourne, August 26, 2017 http://levlafayette.com Utilisation and Rationale The most common use of SSH (secure shell) is remote login access

More information

Workshop on Genomics 2018

Workshop on Genomics 2018 Instructors Workshop on Genomics 2018 Connecting to the cloud and starting an instance. Guy Leonard - guy.leonard@gmail.com Workshop Team Objectives By the end of this session, you will be expected to

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Linux Platform Security Module 9 Application Security Roadmap ssh SSL IPsec & VPNs

More information

CS CS Tutorial 2 2 Winter 2018

CS CS Tutorial 2 2 Winter 2018 CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,

More information

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1 IT Services Security The Dark Arts Of SSH Author: John Curran Version: 0.1 STATUS\ REVISION HISTORY Date Version Description 0.1-0.9 Review preparation 1.0 Presented to business & retained by Information

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server. CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection

More information

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends

More information

Using WestGrid from the desktop Oct on Access Grid

Using WestGrid from the desktop Oct on Access Grid Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you

More information

Bitnami JRuby for Huawei Enterprise Cloud

Bitnami JRuby for Huawei Enterprise Cloud Bitnami JRuby for Huawei Enterprise Cloud Description JRuby is a 100% Java implementation of the Ruby programming language. It is Ruby for the JVM. JRuby provides a complete set of core built-in classes

More information

Introduction to Linux Workshop 1

Introduction to Linux Workshop 1 Introduction to Linux Workshop 1 The George Washington University SEAS Computing Facility Created by Jason Hurlburt, Hadi Mohammadi, Marco Suarez hurlburj@gwu.edu Logging In The lab computers will authenticate

More information

Secure SHell Explained!

Secure SHell Explained! Open Gurus How To Secure SHell Explained! Here re some insights into SSH (Secure Shell), an essential tool for accessing remote machines. S SH is used to access or log in to a remote machine on the network,

More information

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011) UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................

More information

First-Time Login Procedure on XWin32

First-Time Login Procedure on XWin32 First-Time Login Procedure on XWin32 Configuring XWin32 The first time you log into X-Win32, you ll need to do a bit of profile setup; this is a one-time thing, and once done you shouldn t ever need to

More information

Temple University Computer Science Programming Under the Linux Operating System January 2017

Temple University Computer Science Programming Under the Linux Operating System January 2017 Temple University Computer Science Programming Under the Linux Operating System January 2017 Here are the Linux commands you need to know to get started with Lab 1, and all subsequent labs as well. These

More information

Security with SSH. Network Startup Resource Center

Security with SSH. Network Startup Resource Center Security with SSH Network Startup Resource Center http://www.nsrc.org/ These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13. Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP

More information

WinSCP. Author A.Kishore/Sachin

WinSCP. Author A.Kishore/Sachin WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

Robert Bukowski Jaroslaw Pillardy 6/27/2011

Robert Bukowski Jaroslaw Pillardy 6/27/2011 COMPUTATIONAL BIOLOGY SERVICE UNIT, 3CPG RNA Seq CBSU Computational Resources for the Workshop Robert Bukowski (bukowski@cornell.edu); Jaroslaw Pillardy (jp86@cornell.edu) 6/27/2011 In this edition of

More information

Introduction to the Linux Command Line

Introduction to the Linux Command Line Introduction to the Linux Command Line May, 2015 How to Connect (securely) ssh sftp scp Basic Unix or Linux Commands Files & directories Environment variables Not necessarily in this order.? Getting Connected

More information

Author A.Kishore/Sachin WinSCP

Author A.Kishore/Sachin   WinSCP WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

File Transfers. Contents

File Transfers. Contents A File Transfers Contents Overview.................................................... A-3................................ A-3 General Software Download Rules............................ A-4 Using TFTP

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15 APSCN VPN Settings for Windows 7 2 1. Creating a VPN Connection 2 2. Disconnecting the VPN 6 3. Connecting to an existing VPN Connection 7 APSCN VPN Settings for Windows XP 8 1. Creating a VPN Connection

More information

LAB #5 Intro to Linux and Python on ENGR

LAB #5 Intro to Linux and Python on ENGR LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for

More information

Bitnami MySQL for Huawei Enterprise Cloud

Bitnami MySQL for Huawei Enterprise Cloud Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load

More information

LAB :: Secure SHell (SSL)

LAB :: Secure SHell (SSL) LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training

More information

Bitnami MariaDB for Huawei Enterprise Cloud

Bitnami MariaDB for Huawei Enterprise Cloud Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)

More information

Linux for Biologists Part 2

Linux for Biologists Part 2 Linux for Biologists Part 2 Robert Bukowski Institute of Biotechnology Bioinformatics Facility (aka Computational Biology Service Unit - CBSU) http://cbsu.tc.cornell.edu/lab/doc/linux_workshop_part2.pdf

More information

Secure Shell Commands

Secure Shell Commands Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see

More information

Ftp Command Line Manual Windows Example Port 22

Ftp Command Line Manual Windows Example Port 22 Ftp Command Line Manual Windows Example Port 22 Session, Logging, Console/scripting mode, Operations, Configuration enables passive ( =on ) or active ( =off ) transfer mode (FTP protocol only). winscp.exe

More information

Parallel Programming Pre-Assignment. Setting up the Software Environment

Parallel Programming Pre-Assignment. Setting up the Software Environment Parallel Programming Pre-Assignment Setting up the Software Environment Authors: B. Wilkinson and C. Ferner. Modification date: Aug 21, 2014 (Minor correction Aug 27, 2014.) Software The purpose of this

More information

Galaxy How To Remote Desktop Connection and SSH

Galaxy How To Remote Desktop Connection and SSH Galaxy How To Remote Desktop Connection and SSH The host name for the econ Linux server is galaxy.econ.jhu.edu. It is running Ubuntu 18.04 LTS. Please note: you need to be on the VPN to be able to use

More information

ECE112 - Lab 6. Purpose. Parts/tools needed: Make sure we have a properly working environment

ECE112 - Lab 6. Purpose. Parts/tools needed: Make sure we have a properly working environment ECE112 - Lab 6 Purpose Make sure everyone can access a Linux host Get further acquainted with Linux Create a spice netlist, run a simulation Create a lab report using Latex Parts/tools needed: Your laptop

More information

Helsinki 19 Jan Practical course in genome bioinformatics DAY 0

Helsinki 19 Jan Practical course in genome bioinformatics DAY 0 Helsinki 19 Jan 2017 529028 Practical course in genome bioinformatics DAY 0 This document can be downloaded at: http://ekhidna.biocenter.helsinki.fi/downloads/teaching/spring2017/exercises_day0.pdf The

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

Introduction: What is Unix?

Introduction: What is Unix? Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix

More information

For Dr Landau s PHYS8602 course

For Dr Landau s PHYS8602 course For Dr Landau s PHYS8602 course Shan-Ho Tsai (shtsai@uga.edu) Georgia Advanced Computing Resource Center - GACRC January 7, 2019 You will be given a student account on the GACRC s Teaching cluster. Your

More information

Additional laboratory

Additional laboratory Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops

More information

CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG

CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG 1 Notice Class Website http://www.cs.umb.edu/~jane/cs114/ Reading Assignment Chapter 1: Introduction to Java Programming

More information

CS 261 Recitation 1 Compiling C on UNIX

CS 261 Recitation 1 Compiling C on UNIX Oregon State University School of Electrical Engineering and Computer Science CS 261 Recitation 1 Compiling C on UNIX Winter 2017 Outline Secure Shell Basic UNIX commands Editing text The GNU Compiler

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

NoMachine NX Client Configuration Guide

NoMachine NX Client Configuration Guide NoMachine NX Client Configuration Guide Configuration steps for ssh key login Step 1: NoMachine NX requires keys in OpenSSH format, therefore the existing key needs to be converted into OpenSSH format.

More information

Operating Systems. Copyleft 2005, Binnur Kurt

Operating Systems. Copyleft 2005, Binnur Kurt 3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.

More information

Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing

Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Version 2.0 Updated for 2017 Winter Software* Microsoft Windows 7 (64-bit) PuTTY 0.67 PuTTYgen

More information

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out

More information

Introduction to CARC. To provide high performance computing to academic researchers.

Introduction to CARC. To provide high performance computing to academic researchers. Introduction to CARC To provide high performance computing to academic researchers. Machines Metropolis Nano Galles Poblano Pequena Gibbs Ulam Machines (cont.) Machine details, just for example: Nano (supercomputer)

More information

LECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo

LECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo LECTURE 7 Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH Remote Managing In real life, physical access to network nodes is not always an option. Often, we need

More information

HPC Account and Software Setup

HPC Account and Software Setup HPC Account and Software Setup Ken-ichi Nomura MAGICS 2 nd Workshop at USC March 2, 2018 Wireless Network Configuration 1. USC Secure Wireless 2. eduroam 3. MAGICS@USC password: magics@usc 4. USC Guest

More information

Bitnami Coppermine for Huawei Enterprise Cloud

Bitnami Coppermine for Huawei Enterprise Cloud Bitnami Coppermine for Huawei Enterprise Cloud Description Coppermine is a multi-purpose, full-featured web picture gallery. It includes user management, private galleries, automatic thumbnail creation,

More information

Bitnami HHVM for Huawei Enterprise Cloud

Bitnami HHVM for Huawei Enterprise Cloud Bitnami HHVM for Huawei Enterprise Cloud Description HHVM is an open source virtual machine designed for executing programs written in Hack and PHP. HHVM uses a just-in-time (JIT) compilation approach

More information

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette Secure SHell: Connect remotely anything, anywhere UL High Performance Computing (HPC) Team Sebastien Varrette University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 26 Summary 1 Introduction 2

More information

Ftp Command Line Commands Linux Example Windows Putty

Ftp Command Line Commands Linux Example Windows Putty Ftp Command Line Commands Linux Example Windows Putty Installing a FTP server, 11. Switch to Console mode from Graphical User Interface For example, the following creates an entry to start Eclipse with

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

HOBLink Terminal Edition Quick guide

HOBLink Terminal Edition Quick guide HOBLink Terminal Edition Quick guide Installation: To install, we will need to download the HOBLink Terminal Edition 5.3.1 link that you were sent from the HOB Support team. Once downloaded, let us run

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

Spring 2017 Gabriel Kuri

Spring 2017 Gabriel Kuri Lab 2 ECE 431L Spring 2017 Gabriel Kuri This lab is made up of two parts. Part 1 will consist of familiarizing yourself with the Raspberry Pi (RPi). It includes running Unix/Linux commands to become somewhat

More information

Backup and Restore Technical Note

Backup and Restore Technical Note Technical Note VERSION: 1.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Lab #9: Basic Linux Networking

Lab #9: Basic Linux Networking CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use

More information

Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler.

Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler. Programming Tools 1 Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler. What s GCC? - the Gnu Compiler Collection

More information

Setup Guide. Page 0

Setup Guide. Page 0 Email Setup Guide Page 0 Table of Contents Mailbox Setup Guide... 2 Before you Start... 2 Desktop Mail Clients... 3 Outlook 2016 setup... 3 Outlook 2013 setup... 7 Outlook 2010 setup... 12 Windows 10 Mail

More information

How to Enable SFTP on MPE

How to Enable SFTP on MPE How to Enable SFTP on MPE an Allegro Consultants Whitepaper some acknowledgements and a list of prerequisites. That we can run SFTP on MPE is due to the outstanding efforts of folks like Mark Klein, Mark

More information

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017 INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University Updated May 19, 2017 The first thing you will need is SSH. SSH

More information

Tectia Client/Server 6.3 (Windows) Quick Start Guide

Tectia Client/Server 6.3 (Windows) Quick Start Guide Tectia Client/Server 6.3 (Windows) Quick Start Guide 30 March 2016 Tectia Client/Server 6.3 (Windows): Quick Start Guide 30 March 2016 Copyright This software and documentation are protected by international

More information

Introduction to Linux for BlueBEAR. January

Introduction to Linux for BlueBEAR. January Introduction to Linux for BlueBEAR January 2019 http://intranet.birmingham.ac.uk/bear Overview Understanding of the BlueBEAR workflow Logging in to BlueBEAR Introduction to basic Linux commands Basic file

More information

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Description ProcessMaker is an easy-to-use, open source workflow automation and Business Process Management platform, designed so Business

More information

Bitnami ez Publish for Huawei Enterprise Cloud

Bitnami ez Publish for Huawei Enterprise Cloud Bitnami ez Publish for Huawei Enterprise Cloud Description ez Publish is an Enterprise Content Management platform with an easy to use Web Content Management System. It includes role-based multi-user access,

More information

bs^ir^qfkd=obcib`qflk= prfqb=clo=u

bs^ir^qfkd=obcib`qflk= prfqb=clo=u bs^ir^qfkd=obcib`qflk= prfqb=clo=u cçê=u=táåççïë=póëíéãë cçê=lééåsjp=eçëíë cçê=f_j=eçëíë 14.1 bî~äì~íáåö=oéñäéåíáçå=u This guide provides a quick overview of features in Reflection X. This evaluation guide

More information

Ftp Command Line Manual Windows Username Password Linux

Ftp Command Line Manual Windows Username Password Linux Ftp Command Line Manual Windows Username Password Linux Midnight Commander is a console based full-screen text mode File Manager that allows you to copy, MC has many features which are useful for a user

More information