Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility
|
|
- Betty Craig
- 6 years ago
- Views:
Transcription
1 Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility
2 Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config file SFTP, SCP, and file transfer Porting X11 session to your local machine Modules
3 SSH - What is it? SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer. Allows users to securely log into another computer over an insecure network, executes commands and transfers files Created as a replacement for telnet, ftp, rlogin, rsh, and rcp SSH traffic is always encrypted, which makes it safer Usually communicates on port 22, but it can use any port you specify
4 SSH SSH Components SSH Always has a Client and a Host Client - the machine you are sitting in front of A client needs a program, called an SSH client, to connect to another machine via SSH. Host - the server you want to connect to A host is any machine listening for SSH connections. It runs a program called SSHD that waits for SSH connections. When your client sends a request to connect, SSHD handles the negotiation that lets you log in.
5 SSH - Authentication SSH has two common methods of authentication: Password authentication Not as secure as key authentication Easier to set up Key authentication Vastly more secure than password authentication Difficult to set up Easier to use once set up
6 SSH - Key Pair Definition SSH keys are a matching set of cryptographic keys which can be used for authentication. Each set contains a public and a private key. The public key can be shared freely without concern. The private key must be vigilantly guarded and never exposed to anyone. The private key is effectively your password A little later on we will generate a key pair and use it to login to a server
7 SSH - Features SSH is available on most platforms Clients are available for many platforms: Windows, Mac, Unix, Linux, iphone, Android, etc. Free for noncommercial use SSH can multiplex services over the same connection That means you can open an SSH connection and send other kinds of traffic through it One of the most powerful functions of multiplexing is port forwarding or tunneling SSH can securely tunnel insecure applications like POP3, SMTP, IMAP, and CVS.
8 SSH - Connect to a remote host We are going to use shell01.seas.gwu.edu for our remote host in this class To connect: ssh username@shell01.seas.gwu.edu enter your account password To disconnect: type "exit" at the prompt You can daisy chain connections from one host to another ssh username@shell.seas.gwu.edu (from shell01)
9 SSH - Useful commands when connected You can sometimes forget which machine you are connected to. Tips to find out where you are: look at the prompt type hostname type uname -a
10 SSH - Remote Terminal Exercise A big advantage of SSH is the ability to remotely control a machine without having physical access to it. Exercise: Make sure you are disconnected from shell01.seas.gwu.edu From your terminal, type /bin/uname -a What server name pops up? Type ssh username@shell01.seas.gwu.edu /bin/uname -a Enter your password and answer yes to any questions What server name pops up?
11 SSH - The.ssh Directory Inside your home folder, you can create a special folder named.ssh to hold your SSH configuration files and key pairs. Create your own.ssh directory: 1. cd ~ 2. mkdir.ssh 3. chmod u+rwx,g-rwx,o-rwx.ssh You change permissions on the.ssh directory because it can hold your private key, which is just like a password!
12 SSH -.ssh Directory Files Most.ssh directories have configuration files in them. These are some common ones: config - holds configuration information for connecting to specific hosts. authorized_keys - holds public keys for accounts that are allowed to authenticate. If a public key and a private key match, then that account can authenticate known_hosts - a file that holds keys of servers you have connected to. If a server's key has changed, you will be warned when you connect. id_rsa.pub - a public key file id_rsa - a private key file
13 SSH - Generate a key pair Let's generate your key pair! 1. Make sure you are logged out from shell01 (check your prompt) 2. cd ~/.ssh 3. ssh-keygen -t rsa -b C "username@gwu.edu" a. rsa is the algorithm for encryption b. -b is the number of bits for your key c bits is 512 bytes, or the equivalent of a 512 character password!
14 SSH - Lets look at your keys Your keys will appear to be gibberish, but they are magic! cd ~/.ssh cat id_rsa - this is your private key cat id_rsa.pub - this is your public key
15 SSH - Create your authorized_keys file If a public key is added to the authorized_keys file, then a user with the corresponding private key can login to that account cd ~/.ssh touch authorized_keys cat id_rsa.pub >> authorized_keys chmod u+rw,g-rwx,o-rwx authorized_keys
16 SSH - Create your config file You can force key authentication for a server by creating a config file cd ~/.ssh nano config, then type: Host shell01 Hostname shell01.seas.gwu.edu PreferredAuthentications publickey User <username> Save the file
17 SSH - Login to Shell01 with your key If configured correctly, you can now SSH to shell01 without having to enter a password. ssh shell01 This is the shortcut you created in your config file
18 SSH - SFTP The SSH File Transfer Protocol (SFTP) enables secure file transfer capabilities between networked hosts. All SFTP traffic is encrypted FTP (File Transfer Protocol) is insecure. SFTP, like SSH, requires a client and a host (server). You authenticate with the same credentials you use for SSH
19 SSH - SFTP command line client SFTP can be used at the command line on linux machines and some Apple machines. You can launch it by typing: sftp username@shell01.seas.gwu.edu Use? for help Regular commands occur on the remote server. ls, pwd, cd, etc. To work on your local machine, prepend the letter l to the commands: lpwd, lls, lcd, etc. Use "put" to transfer files TO the server Use "get" to transfer files FROM the server
20 SSH - SFTP GUI Clients Using the command line SFTP client is confusing, frustrating, and inconvenient. There are many free SFTP utilities for Windows, Apple, and Linux machines. GUI clients are easy to use and necessary if you will transfer a large amount of folders or files between machines. Windows Filezilla - Apple Cyberduck - Linux Filezilla -
21 SSH - Secure Copy (SCP) The scp command securely copies files and directories between remote hosts without starting an FTP session or logging into the remote systems explicitly. The scp command uses SSH to transfer data, so it requires a password or passphrase for authentication. Usage: scp Source Destination scp user@host1:file1 user@host2:file2 host1 or host2 can be your local workstation or the server You do not need to include the user@host* section when referring to your local workstation. Just the path is OK
22 SSH - SCP Examples SCP is good for moving one or two files quickly. Move a file FROM a server TO your workstation: scp username@shell01:/tmp/class_example.txt /homedirectory/ Move a file TO a server FROM your workstation: scp /homedirectory/class_example.txt username@shell01.seas.gwu.edu:/tmp/username.txt In the second example, we are renaming the file so the whole class doesn't try to write the same file name at the same time.
23 SSH - SCP Examples SCP is good for moving one or two files quickly. Move a file FROM a server TO your workstation: scp username@shell01:/tmp/class_example.txt ~/ Move a file TO a server FROM your workstation: scp ~/class_example.txt username@shell01.seas.gwu.edu:/tmp/username.txt In the second example, we are renaming the file so the whole class doesn't try to write the same file name at the same time.
24 SSH - X Windows X or XWindows was designed from the beginning to be network-centric, and adopts a "client-server" model. It provides a Graphical User Interface for Linux applications. An X "client" is usually an application written with X libraries, like Matlab or your Window Manager that makes up your desktop The X Server draws what you see on the screen and manages the keyboard and mouse. When you run an application remotely, your workstation is running the X Server.
25 SSH - X Windows X or XWindows was designed from the beginning to be network-centric, and adopts a "client-server" model. It provides a Graphical User Interface for Linux applications. An X "client" is usually an application written with X libraries, like Matlab or your Window Manager that makes up your desktop The X Server draws what you see on the screen and manages the keyboard and mouse. When you run an application remotely, your workstation is running the X Server.
26 SSH - X Windows Architecture
27 SSH - X Windows Forwarding Requirements X Window Forwarding refers to sending the display of a program from one machine to another. Forwarding requires a small program to run on machines without a native X Server if you want to port the display to your workstation. Windows and OS X do not have a native X Server built in Most linux builds have an X Server built in
28 SSH - X Windows Server programs Windows X Ming (use with Putty) - MobaxTerm (Easier) - Apple OS X XQuartz - XQaurtz may require you to install the Apple OS X SDK from the Apple Store (free download) Linux An X Server is usually installed with the OS
29 SSH - X Window Forwarding Connection You need to tell your SSH session that you want to forward X traffic from the machine you are connecting to. Windows Your SSH client will have a checkbox somewhere that says "Forward X traffic" In Putty it is under the Connection/SSH/X11 menu If you use Putty, you have to launch XMing manually Apple OS X ssh -X username@server (this will automatically launch XQuartz) Linux ssh -X username@server
30 SSH - X Window Forwarding Exercise Use your linux workstation to start an X connection to shell01 From the terminal: 1. ssh -X username@shell01.seas.gwu.edu 2. type xeyes 3. Close xeyes 4. type xclock 5. close xclock 6. type xterm 7. In the xterm window, type hostname 8. close xterm
31 Modules Modules are small scripts that run and configure your linux environment so it can run a specific program. Modules load an environment so a program can run correctly. SEAS uses modules on Shell01 for Matlab, anysys, Comsol, and other programs. Modules do not install a program, they only configure your environment. Modules can be loaded simultaneously with other modules. Modules can be requested for shell01 via support@ticket.seas.gwu.edu Modules can be requested for Colonial One via hpchelp@gwu.edu
32 Modules - Module commands module avail - show available modules module list - show loaded modules module load - load a module module unload - unload a module
33 Modules - Module syntax Use module avail to see a list of modules you can load. Use the full name of the module to prevent confusion since there may be more than one version of a program available. module avail results: abaqus/abaqus_v comsol/comsol_5.1_fnl matlab/r2015b pgi/10.5 anaconda/anaconda3 comsol/comsol_5.2_ckl mpi/compat-openmpi-psm-x86_64 silvaco/tcad2015 ansys/ansys16.2 comsol/comsol_5.2_fnl mpi/compat-openmpi-x86_64 tecplot/tecplot360ex_2014
34 Modules - Module Exercise Use module load to load files. Remember to use the full name of the module! ssh -X username@shell01.seas.gwu.edu Before you load the module: type runwb2. What happens? type module load ansys/ansys16.2 Now type runwb2 again. What happens? Choose File Exit and close Ansys workbench type printenv then find the entry in your PATH variable that lets you load Ansys type module unload ansys/ansys16.2 Type printenv again and see if the ansys entry is in your PATH variable
Project #6: Using ssh, scp and sftp with Key-Based Authentication
Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our
More informationFEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs
FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More information2-1-1 ssh Secure SHell
2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup 1 Communicate Safely with Remote Systems 2 What is Safely Authentication I am Assured of Which Host I am Talking
More informationBitnami Apache Solr for Huawei Enterprise Cloud
Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,
More informationssh and handson Matsuzaki maz Yoshinobu 1
ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted
More informationConfiguring SSH Public Key Authentication
6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running
More informationCryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan
Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted
More informationSetting up a Chaincoin Masternode
Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version
More information2-1-1 ssh Secure SHell
2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup Communicate Safely with Remote Systems What is Safely Authentication I am Assured of Which Host I am Talking
More informationSSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:
SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows
More informationTelnet/SSH. Connecting to Hosts. Internet Technology 1
Telnet/SSH Connecting to Hosts Internet Technology 1 What is Telnet? Method for connecting to hosts Enables remote login (rlogin) to computers on the Internet One computer can connect to another to use
More informationWhat is Secure. Authenticated I know who I am talking to. Our communication is Encrypted
Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers
More informationTELE301 Lab16 - The Secure Shell
TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................
More informationUnit: Making a move (using FTP)
Data Introduction to Unix and HPC (HPC for Wimps) Unit: Making a move (using FTP) Goals: Can login via Secure FTP and see home directory. Can transfer a file from local machine via FTP to home directory.
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH
More informationCryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia
Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers
More informationBitnami MEAN for Huawei Enterprise Cloud
Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable
More informationCryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal
More informationUsing a Linux System 6
Canaan User Guide Connecting to the Cluster 1 SSH (Secure Shell) 1 Starting an ssh session from a Mac or Linux system 1 Starting an ssh session from a Windows PC 1 Once you're connected... 1 Ending an
More informationsftp - secure file transfer program - how to transfer files to and from nrs-labs
last modified: 2017-01-20 p. 1 CS 111 - useful details: ssh, sftp, and ~st10/111submit You write Racket BSL code in the Definitions window in DrRacket, and save that Definitions window's contents to a
More informationSecure Shell Commands
This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine
More informationKey File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171
Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY
More informationSecure Shell Commands
This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure
More informationLinux Network Administration
Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH
More informationUser Guide Version 2.0
User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...
More informationNo More Passwords (with SSH)
No More Passwords (with SSH) Ted Dustman March 30, 2009 Contents 1 Introduction 1 1.1 Local or Remote?................................. 1 1.2 SSH Command Set................................ 1 2 Authentication
More informationNew User Tutorial. OSU High Performance Computing Center
New User Tutorial OSU High Performance Computing Center TABLE OF CONTENTS Logging In... 3-5 Windows... 3-4 Linux... 4 Mac... 4-5 Changing Password... 5 Using Linux Commands... 6 File Systems... 7 File
More informationAn Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017
An Overview of SSH Presentation to Linux Users of Victoria Melbourne, August 26, 2017 http://levlafayette.com Utilisation and Rationale The most common use of SSH (secure shell) is remote login access
More informationWorkshop on Genomics 2018
Instructors Workshop on Genomics 2018 Connecting to the cloud and starting an instance. Guy Leonard - guy.leonard@gmail.com Workshop Team Objectives By the end of this session, you will be expected to
More informationAdobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data
More informationFundamentals of Linux Platform Security
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Linux Platform Security Module 9 Application Security Roadmap ssh SSL IPsec & VPNs
More informationCS CS Tutorial 2 2 Winter 2018
CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,
More informationIT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1
IT Services Security The Dark Arts Of SSH Author: John Curran Version: 0.1 STATUS\ REVISION HISTORY Date Version Description 0.1-0.9 Review preparation 1.0 Presented to business & retained by Information
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationYou can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.
CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection
More informationPractical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February
Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends
More informationUsing WestGrid from the desktop Oct on Access Grid
Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you
More informationBitnami JRuby for Huawei Enterprise Cloud
Bitnami JRuby for Huawei Enterprise Cloud Description JRuby is a 100% Java implementation of the Ruby programming language. It is Ruby for the JVM. JRuby provides a complete set of core built-in classes
More informationIntroduction to Linux Workshop 1
Introduction to Linux Workshop 1 The George Washington University SEAS Computing Facility Created by Jason Hurlburt, Hadi Mohammadi, Marco Suarez hurlburj@gwu.edu Logging In The lab computers will authenticate
More informationSecure SHell Explained!
Open Gurus How To Secure SHell Explained! Here re some insights into SSH (Secure Shell), an essential tool for accessing remote machines. S SH is used to access or log in to a remote machine on the network,
More informationUoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)
UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................
More informationFirst-Time Login Procedure on XWin32
First-Time Login Procedure on XWin32 Configuring XWin32 The first time you log into X-Win32, you ll need to do a bit of profile setup; this is a one-time thing, and once done you shouldn t ever need to
More informationTemple University Computer Science Programming Under the Linux Operating System January 2017
Temple University Computer Science Programming Under the Linux Operating System January 2017 Here are the Linux commands you need to know to get started with Lab 1, and all subsequent labs as well. These
More informationSecurity with SSH. Network Startup Resource Center
Security with SSH Network Startup Resource Center http://www.nsrc.org/ These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationSetting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.
Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP
More informationWinSCP. Author A.Kishore/Sachin
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationRobert Bukowski Jaroslaw Pillardy 6/27/2011
COMPUTATIONAL BIOLOGY SERVICE UNIT, 3CPG RNA Seq CBSU Computational Resources for the Workshop Robert Bukowski (bukowski@cornell.edu); Jaroslaw Pillardy (jp86@cornell.edu) 6/27/2011 In this edition of
More informationIntroduction to the Linux Command Line
Introduction to the Linux Command Line May, 2015 How to Connect (securely) ssh sftp scp Basic Unix or Linux Commands Files & directories Environment variables Not necessarily in this order.? Getting Connected
More informationAuthor A.Kishore/Sachin WinSCP
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationFile Transfers. Contents
A File Transfers Contents Overview.................................................... A-3................................ A-3 General Software Download Rules............................ A-4 Using TFTP
More informationSession 1: Accessing MUGrid and Command Line Basics
Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources
More informationAPSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15
APSCN VPN Settings for Windows 7 2 1. Creating a VPN Connection 2 2. Disconnecting the VPN 6 3. Connecting to an existing VPN Connection 7 APSCN VPN Settings for Windows XP 8 1. Creating a VPN Connection
More informationLAB #5 Intro to Linux and Python on ENGR
LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for
More informationBitnami MySQL for Huawei Enterprise Cloud
Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load
More informationLAB :: Secure SHell (SSL)
LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training
More informationBitnami MariaDB for Huawei Enterprise Cloud
Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)
More informationLinux for Biologists Part 2
Linux for Biologists Part 2 Robert Bukowski Institute of Biotechnology Bioinformatics Facility (aka Computational Biology Service Unit - CBSU) http://cbsu.tc.cornell.edu/lab/doc/linux_workshop_part2.pdf
More informationSecure Shell Commands
Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see
More informationFtp Command Line Manual Windows Example Port 22
Ftp Command Line Manual Windows Example Port 22 Session, Logging, Console/scripting mode, Operations, Configuration enables passive ( =on ) or active ( =off ) transfer mode (FTP protocol only). winscp.exe
More informationParallel Programming Pre-Assignment. Setting up the Software Environment
Parallel Programming Pre-Assignment Setting up the Software Environment Authors: B. Wilkinson and C. Ferner. Modification date: Aug 21, 2014 (Minor correction Aug 27, 2014.) Software The purpose of this
More informationGalaxy How To Remote Desktop Connection and SSH
Galaxy How To Remote Desktop Connection and SSH The host name for the econ Linux server is galaxy.econ.jhu.edu. It is running Ubuntu 18.04 LTS. Please note: you need to be on the VPN to be able to use
More informationECE112 - Lab 6. Purpose. Parts/tools needed: Make sure we have a properly working environment
ECE112 - Lab 6 Purpose Make sure everyone can access a Linux host Get further acquainted with Linux Create a spice netlist, run a simulation Create a lab report using Latex Parts/tools needed: Your laptop
More informationHelsinki 19 Jan Practical course in genome bioinformatics DAY 0
Helsinki 19 Jan 2017 529028 Practical course in genome bioinformatics DAY 0 This document can be downloaded at: http://ekhidna.biocenter.helsinki.fi/downloads/teaching/spring2017/exercises_day0.pdf The
More informationLab 1: Accessing the Linux Operating System Spring 2009
CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux
More informationIntroduction: What is Unix?
Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix
More informationFor Dr Landau s PHYS8602 course
For Dr Landau s PHYS8602 course Shan-Ho Tsai (shtsai@uga.edu) Georgia Advanced Computing Resource Center - GACRC January 7, 2019 You will be given a student account on the GACRC s Teaching cluster. Your
More informationAdditional laboratory
Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops
More informationCS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG
CS/IT 114 Introduction to Java, Part 1 FALL 2016 CLASS 2: SEP. 8TH INSTRUCTOR: JIAYIN WANG 1 Notice Class Website http://www.cs.umb.edu/~jane/cs114/ Reading Assignment Chapter 1: Introduction to Java Programming
More informationCS 261 Recitation 1 Compiling C on UNIX
Oregon State University School of Electrical Engineering and Computer Science CS 261 Recitation 1 Compiling C on UNIX Winter 2017 Outline Secure Shell Basic UNIX commands Editing text The GNU Compiler
More informationContents. Configuring SSH 1
Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list
More informationNoMachine NX Client Configuration Guide
NoMachine NX Client Configuration Guide Configuration steps for ssh key login Step 1: NoMachine NX requires keys in OpenSSH format, therefore the existing key needs to be converted into OpenSSH format.
More informationOperating Systems. Copyleft 2005, Binnur Kurt
3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.
More informationSetting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing
Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Version 2.0 Updated for 2017 Winter Software* Microsoft Windows 7 (64-bit) PuTTY 0.67 PuTTYgen
More informationOperating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing
Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out
More informationIntroduction to CARC. To provide high performance computing to academic researchers.
Introduction to CARC To provide high performance computing to academic researchers. Machines Metropolis Nano Galles Poblano Pequena Gibbs Ulam Machines (cont.) Machine details, just for example: Nano (supercomputer)
More informationLECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo
LECTURE 7 Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH Remote Managing In real life, physical access to network nodes is not always an option. Often, we need
More informationHPC Account and Software Setup
HPC Account and Software Setup Ken-ichi Nomura MAGICS 2 nd Workshop at USC March 2, 2018 Wireless Network Configuration 1. USC Secure Wireless 2. eduroam 3. MAGICS@USC password: magics@usc 4. USC Guest
More informationBitnami Coppermine for Huawei Enterprise Cloud
Bitnami Coppermine for Huawei Enterprise Cloud Description Coppermine is a multi-purpose, full-featured web picture gallery. It includes user management, private galleries, automatic thumbnail creation,
More informationBitnami HHVM for Huawei Enterprise Cloud
Bitnami HHVM for Huawei Enterprise Cloud Description HHVM is an open source virtual machine designed for executing programs written in Hack and PHP. HHVM uses a just-in-time (JIT) compilation approach
More informationTutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette
Secure SHell: Connect remotely anything, anywhere UL High Performance Computing (HPC) Team Sebastien Varrette University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 26 Summary 1 Introduction 2
More informationFtp Command Line Commands Linux Example Windows Putty
Ftp Command Line Commands Linux Example Windows Putty Installing a FTP server, 11. Switch to Console mode from Graphical User Interface For example, the following creates an entry to start Eclipse with
More informationContents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note
More informationHOBLink Terminal Edition Quick guide
HOBLink Terminal Edition Quick guide Installation: To install, we will need to download the HOBLink Terminal Edition 5.3.1 link that you were sent from the HOB Support team. Once downloaded, let us run
More informationContents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...
Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing
More informationSpring 2017 Gabriel Kuri
Lab 2 ECE 431L Spring 2017 Gabriel Kuri This lab is made up of two parts. Part 1 will consist of familiarizing yourself with the Raspberry Pi (RPi). It includes running Unix/Linux commands to become somewhat
More informationBackup and Restore Technical Note
Technical Note VERSION: 1.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationLab #9: Basic Linux Networking
CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use
More informationMost of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler.
Programming Tools 1 Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler. What s GCC? - the Gnu Compiler Collection
More informationSetup Guide. Page 0
Email Setup Guide Page 0 Table of Contents Mailbox Setup Guide... 2 Before you Start... 2 Desktop Mail Clients... 3 Outlook 2016 setup... 3 Outlook 2013 setup... 7 Outlook 2010 setup... 12 Windows 10 Mail
More informationHow to Enable SFTP on MPE
How to Enable SFTP on MPE an Allegro Consultants Whitepaper some acknowledgements and a list of prerequisites. That we can run SFTP on MPE is due to the outstanding efforts of folks like Mark Klein, Mark
More informationINSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017
INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University Updated May 19, 2017 The first thing you will need is SSH. SSH
More informationTectia Client/Server 6.3 (Windows) Quick Start Guide
Tectia Client/Server 6.3 (Windows) Quick Start Guide 30 March 2016 Tectia Client/Server 6.3 (Windows): Quick Start Guide 30 March 2016 Copyright This software and documentation are protected by international
More informationIntroduction to Linux for BlueBEAR. January
Introduction to Linux for BlueBEAR January 2019 http://intranet.birmingham.ac.uk/bear Overview Understanding of the BlueBEAR workflow Logging in to BlueBEAR Introduction to basic Linux commands Basic file
More informationBitnami ProcessMaker Community Edition for Huawei Enterprise Cloud
Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Description ProcessMaker is an easy-to-use, open source workflow automation and Business Process Management platform, designed so Business
More informationBitnami ez Publish for Huawei Enterprise Cloud
Bitnami ez Publish for Huawei Enterprise Cloud Description ez Publish is an Enterprise Content Management platform with an easy to use Web Content Management System. It includes role-based multi-user access,
More informationbs^ir^qfkd=obcib`qflk= prfqb=clo=u
bs^ir^qfkd=obcib`qflk= prfqb=clo=u cçê=u=táåççïë=póëíéãë cçê=lééåsjp=eçëíë cçê=f_j=eçëíë 14.1 bî~äì~íáåö=oéñäéåíáçå=u This guide provides a quick overview of features in Reflection X. This evaluation guide
More informationFtp Command Line Manual Windows Username Password Linux
Ftp Command Line Manual Windows Username Password Linux Midnight Commander is a console based full-screen text mode File Manager that allows you to copy, MC has many features which are useful for a user
More information