CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017
|
|
- Quentin Sims
- 5 years ago
- Views:
Transcription
1 CS 200 User IDs, Passwords, Permissions & Groups 1
2 Needed to control access to sharepoints and their contents Because Macs & PCs now support multiple accounts, user IDs and passwords are also needed on your client machine by default, you and only you, have access to the folders & files you create for the most part you don t notice them because it s automatic ie. happens by default, although you can give others access A group is a named collection of user IDs User IDs & Passwords on unix machines (eg. Macs), access to a file or folder can be given to the members of a group in addition to the owner 2
3 Permissions as seen by OS X s Finder Permissions for files Read & Write Read Only No Access Permissions for folders Read & Write (full access) Read Only (list contents) Write Only (Drop Box) No Access Permissions are granted separately to the owner (identified by a userid) a group others ie everyone else, aka public permissions if you are not the owner & your userid is in the group, you get group access otherwise you have whatever access the file or folder s public permissions provide Only the owner can change a file or folder s permissions 3
4 Changing Permissions in a Unix Terminal Open a Terminal/Unix shell Applications: Utilities: Terminal Log into your student.cs.account ssh bmdaly@linux.student.cs.uwaterloo.ca Change to your public_html directory (web root folder) cd public_html Look at the permissions of the files within that folder CS 200 Spring Userids, Passwords, Permissions & Groups
5 What do the permissions mean? User (u) first three or four letters Group (g) next set of three letters Other (o) last set of three letters r Read Only w Write Only x Executable d Directory 5
6 Final steps to change permissions on a folder Change the group and everyone permissions to be readable chmod go+rx cs200.html This will change the permissions on the file cs200.html to be: readable and executable to the group and everyone chmod -R go+rx publc_html This will change the permissions of all files within the public_html folder to be: readable and executable to the group and everyone it applies to all the files within public_html because -R means recursive chmod g+rwx cs200.html This will change the permissions on the file cs200.html to be: readable, writable, executable to the group chmod g-w cs200.html This changes the permissions of the file cs200.html: It removes the writable permissions for the group CS 200 Fall Userids, Passwords, Permissions & Groups
7 Using your own machine (1) You can change permissions on files on your own machine by accessing a unix shell such as Terminal To change permissions on files on your student.cs network drive from your own machine: use a unix shell such as Terminal login to your student.cs account by typing ssh userid@linux.student.cs.uwaterloo.ca, where userid is your Quest/student.cs username, then press Enter type your student.cs password and press Enter you can now change permissions on the files in your student.cs network drive as you would from a campus machine 7
8 Using your own machine (2) If you want to access and use the files from your student.cs network drive on your own machine: Connect to the server smb://smb-files.student.cs.uwaterloo.ca On a mac, go to Finder > Go > Connect to Server Enter your Quest/student.cs username and your student.cs password You can then select your username to mount your network drive If you want to access and use these files on your own machine and you are off campus: Follow the instructions here: to set up a VPN client and access the university s VPN You can then follow the above instructions 8
:
CS200 Assignment 5 HTML and CSS Due Monday February 11th 2019, 11:59 pm Readings and Resources On the web: http://validator.w3.org/ : a site that will check a web page for faulty HTML tags http://jigsaw.w3.org/css-validator/
More informationCS CS Tutorial 2 2 Winter 2018
CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,
More informationCS 1301 Fall 2008 Lab 2 Introduction to UNIX
CS 1301 Fall 2008 Lab 2 Introduction to UNIX Due: Friday, September 19 th, at 6 PM (Monday, September 22 nd for 10% off) Notes: Do not wait until the last minute to do this assignment in case you run into
More informationCS 1301 Lab 2 Introduction to Webservers at GaTech
CS 1301 Lab 2 Introduction to Webservers at GaTech Due Friday February 19th, 2016, Before 11:55pm Notes: Do not wait until the last minute to do this assignment in case you run into problems. If you find
More informationIntroduction to the Linux Command Line
Introduction to the Linux Command Line May, 2015 How to Connect (securely) ssh sftp scp Basic Unix or Linux Commands Files & directories Environment variables Not necessarily in this order.? Getting Connected
More informationUnix Groups and Users
CHMOD TUTORIAL AND XOOPS FILE SECURITIES The Xoops Site Security Guide has dealt with securities issues almost exclusively about possible intrusions or threats from outside of your Xoops site or server.
More informationWhere to save your work
Where to save your work on the Kent network Contents Your network folders...2 Where to find your folders...2 Access your files from your laptop...3 Access your files from off campus...4 Help and support...5
More informationFile Transfer with SSH
File Transfer with SSH To complete the lab experiment reports, the student is first required to upload the report templates from the course website to his OIT UNIX account home area. From there he has
More informationFIT 100: Fluency with Information Technology
FIT 100: Fluency with Information Technology Lab 2: Creating Directories and Navigating Directory Structures (or, Where am I, where are my files, and how do I put my files somewhere else?) Local vs. Remote
More informationPrinciples of Bioinformatics. BIO540/STA569/CSI660 Fall 2010
Principles of Bioinformatics BIO540/STA569/CSI660 Fall 2010 Lecture Five Practical Computing Skills Emphasis This time it s concrete, not abstract. Fall 2010 BIO540/STA569/CSI660 3 Administrivia Monday
More informationUsers, Groups and Permission in Linux
Users, Groups and Permission in Linux A small company is using Linux as the main operating and has hired you as a consultant. You completed a site walk through and also met with various individuals for
More informationContents. CMSP File Sharing User s Guide
2 Contents Overview... 3 x.500 id access... 4 Internal Accounts... 4 Virtual Private Network (VPN)... 5 Accessing Your Data on UMN network... 5 Windows Platforms... 5 OS X Platforms...14 3 Overview As
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More informationCommon UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface
Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,
More informationCS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX
CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot
More informationSession 1: Accessing MUGrid and Command Line Basics
Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources
More informationLab 5: Dreamweaver CS5, Uploading your Web site
Lab 5: Dreamweaver CS5, Uploading your Web site Setting up Local and Remote Information: 1. Launch Dreamweaver 2. Choose site->new site 3. By Site Name give your site a name. Make sure the name has no
More informationOregon State University School of Electrical Engineering and Computer Science. CS 261 Recitation 1. Spring 2011
Oregon State University School of Electrical Engineering and Computer Science CS 261 Recitation 1 Spring 2011 Outline Using Secure Shell Clients GCC Some Examples Intro to C * * Windows File transfer client:
More informationcommandname flags arguments
Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands
More informationUsing WestGrid from the desktop Oct on Access Grid
Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you
More informationClearspan Communicator Desktop R20.2.2
Clearspan Communicator Desktop R20.2.2 UPGRADE INSTRUCTIONS APRIL 2015 Table of Contents Overview... 3 Upgrading (Windows 7 or above, Mac OS 10.6 or above)... 3 Recording Your Settings (Windows and Mac
More informationCENG 334 Computer Networks. Laboratory I Linux Tutorial
CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction
More informationFrom using an External Harddrive, to a Google Cloud Drive; there is no one way to backup data.
Mac (OS X): Data Backup Guide 6/14/2016 Why: Backing up data should be done on a regular basis, not just when you think it is necessary, as a failure can happen at any time. While there are no set intervals
More informationBasic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro
Basic Unix Biochemistry laboratories - 201 Jean-Yves Sgro -jsgro@wisc.edu Find this document here (short URL) today: http://go.wisc.edu/4iu8u5 *Note*: To see as slides click on **"Gift icon"** at the top
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More information5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9
File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations
More informationMapping Network Shares
CAS Computing Mapping Network Shares Contents: Mapping Network Shares in Windows Vista/7.1 Mapping Network Shares in Mac OS X (10.5+). 3 Access to Shares and Student Access.5 CAS Computing Services, (518)
More informationHitchhiker s Guide to VLSI Design with Cadence & Synopsys
Hitchhiker s Guide to VLSI Design with Cadence & Synopsys David Money Harris 17 January 2009 The VLSI design tools at Harvey Mudd College are hosted on a Linux server named chips. This document introduces
More informationProgramming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel)
Programming Project # 2 cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Background context Unix permissions model Prof Mitchell will cover during OS security (next week
More informationMicrosoft TS: Windows Small Business Server 2011 Standard, Configuring. Practice Test. Version:
Microsoft 70-169 TS: Windows Small Business Server 2011 Standard, Configuring Practice Test Version: 14.21 QUESTION NO: 1 Standard. You create an email-enabled security group named Accounting. You add
More informationRemote Access User Guide for Mac OS (Citrix Instructions)
(Citrix Instructions) VERSION: 003 PUBLISHED: 2/2018 Page 1 of 8 Remote Access User Guide for Mac OS Please follow the steps outlined in this guide which will show you how to access the Clarion Partners
More information1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationIT Essentials II: NOS Linux Labs Using Knoppix
IT Essentials II: NOS Linux Labs Using Knoppix 1 IT Essentials II Linux Labs Using Knoppix Agenda Course Overview Knoppix Lab Map Knoppix Overview Lab: Basic System Administration in Knoppix v2 2 IT Essentials
More informationWebDAV. Overview. File Permissions and Management. Authentication Methods
WebDAV Overview WebDAV integration provides access to the file system on the staging server similar to FTP/SFTP and can be used in lieu of FTP/SFTP. WebDAV (Web Distributed Authoring and Versioning) is
More informationChapter 8: Security under Linux
Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system
More informationOutlook Desktop Application for Windows
Access Your Email There are two common ways to access your mail: via the Outlook Desktop Application and the Outlook Web Application. This document focuses on how to use the Outlook Desktop Application
More informationPermission and Ownership
Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined
More informationOperating Systems Linux 1-2 Measurements Background material
Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing
More informationTelnet & FTP. Department of Educational Multimedia Faculty of Education
Telnet & FTP Department of Educational Multimedia Faculty of Education TCP/IP Applications World Wide Web's Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) File Transfer Protocol
More informationCMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts
CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts Setting Up (PC) Go to the link for the encrypted telnet program PuTTY (Simon Tatham s site in the UK at http://www.chiark.greenend.org.uk/~sgtatham/putty/).
More informationLinux at the Command Line Don Johnson of BU IS&T
Linux at the Command Line Don Johnson of BU IS&T We ll start with a sign in sheet. We ll end with a class evaluation. We ll cover as much as we can in the time allowed; if we don t cover everything, you
More informationTEMPO INSTALLATION I O A. Platform Independent Notes 1. Installing Tempo 3. Installing Tools for the Plugins 5. v0.2.
TEMPO INSTALLATION v0.2.2 (BETA) 2/7/2008 Platform Independent Notes 1 On Windows: 2 On Linux: 2 On OS X (Tiger 10.4.7 and later) 2 I O A Installing Tempo 3 Installing on Windows (Vista/XP/W2K) 3 Installing
More informationSIMICART USER GUIDE SERIES. SimiCart Install SimiConnector
SIMICART USER GUIDE SERIES Install SimiConnector TABLE OF CONTENTS I. INSTALL SIMICONNECTOR 3 II. CHECK CONNECTOR AFTER INSTALL 12 I. INSTALL SIMICONNECTOR 1) Download SimiConnector: https://github.com/simicart/simicart-magento2.x
More informationCENG200 - Lab 2: Security, Simple Web Pages
Out: Sept 12, 2016 Due: Sept 26, 2016 (start of lecture) Preliminary Steps CENG200 - Lab 2: Security, Simple Web Pages A. When you log in for this lab, perform the following actions (one time only) chmod
More informationHow to Create a NetBeans PHP Project
How to Create a NetBeans PHP Project 1. SET UP PERMISSIONS FOR YOUR PHP WEB SITE... 2 2. CREATE NEW PROJECT ("PHP APPLICATION FROM REMOTE SERVER")... 2 3. SPECIFY PROJECT NAME AND LOCATION... 2 4. SPECIFY
More informationFind out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~
CIS 105 Working with directories You have using directories in a Windows environment extensively. Often in Windows we are calling them folders. They are important in order to organize our files. It is
More informationFaculty and Staff Instructions for connecting to the Hood College VPN to access your files on Blazer and/or your on-campus computer
Faculty and Staff Instructions for connecting to the Hood College VPN to access your files on Blazer and/or your on-campus computer NOTE: These instructions were written for Windows XP. Also, please note
More informationMy Site. Introduction
My Site Introduction My Site is a component of the portal that is available to all NB educators. It is a personalized site that provides all users with the following features: A place to save and share
More informationRemote Access to Matlab at Mason. CDS-130: Computing for Scientists. Spring Jie Zhang
Remote Access to Matlab at Mason CDS-130: Computing for Scientists Spring 2013 Jie Zhang Credit: Joseph Marr, Samantha Fleming Accessing Matlab at Mason There are four different methods to access Matlab
More informationGoals for This Lecture:
Goals for This Lecture: Understand how to log in remotely with SSH Understand how to transfer files with SCP Learn how to log in from SINC site windows PC s with XWIN32 Understand the long form listings
More informationChap2: Operating-System Structures
Chap2: Operating-System Structures Objectives: services OS provides to users, processes, and other systems structuring an operating system how operating systems are designed and customized and how they
More informationSBCC Web File System - Xythos
Table of Contents Table of Contents...1 Purpose...1 Login Procedure...1 Creating and Sharing a Web Folder for MAT153...2 Dreamweaver Remote Info...4 I Forgot My Pipeline Credentials...6 Purpose This purpose
More informationCMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts
CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts The Goal The ultimate goal of this assignment is to create a Web page on the server, make sure it is visible to the outside world, and to design and
More informationLinux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2
Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working
More informationUsing BlueStep Data Vault with WebDAV
Using BlueStep Data Vault with WebDAV New BlueStep Functionality In order to meet our client s needs and expand our capabilities and services, BlueStep has implemented the use of the WebDAV Internet standard
More informationPeopleSoft Financials for Macintosh
PeopleSoft Financials for Macintosh Microsoft Remote Desktop for Macintosh Download Microsoft Remote Desktop from the Mac App Store Install the app and place a shortcut on the dock for easy access Configure
More informationUnix Workshop Aug 2014
Unix Workshop 2014 5 Aug 2014 What is Unix Multitasking, multiuser operating system Often the OS of choice for large servers, large clusters Unix Around You You re probably familiar with these: Linux Solaris
More informationCSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions
CSE 390a Lecture 3 Multi-user systems; remote login; editors; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1
More informationFlash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes
Welcome This is a small packet of information concerning some of the simpler uses of technology in the department, how to transfer files, change your password, that sort of thing. In this department, we
More informationBooting a Galaxy Instance
Booting a Galaxy Instance Create Security Groups First time Only Create Security Group for Galaxy Name the group galaxy Click Manage Rules for galaxy Click Add Rule Choose HTTPS and Click Add Repeat Security
More informationHow to Access CTC via VPN with Mac OS 10.7x
NAME: How to Access CTC via VPN with Mac OS 10.7x PAGE: 1 of 16 How to Access CTC via VPN with Mac OS 10.7x Before you begin, please review the following: If you do not already have VPN permission, please
More informationShort Read Sequencing Analysis Workshop
Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction
More information: the User (owner) for this file (your cruzid, when you do it) Position: directory flag. read Group.
CMPS 12L Introduction to Programming Lab Assignment 2 We have three goals in this assignment: to learn about file permissions in Unix, to get a basic introduction to the Andrew File System and it s directory
More informationCSCI 350 Virtual Machine Setup Guide
CSCI 350 Virtual Machine Setup Guide This guide will take you through the steps needed to set up the virtual machine to do the PintOS project. Both Macintosh and Windows will run just fine. We have yet
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationCitrix Desktop for Home Computers Mac OS Instructions
Citrix Desktop for Home Computers Mac OS Instructions You can use Citrix to create and access a virtual work desktop from your home computer. Step 1 Uninstall: To install the newest version of Citrix on
More informationLinux Command Line Primer. By: Scott Marshall
Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and
More informationAutomatic Creation of a Virtual Network with VBoxManage [1]
Automatic Creation of a Virtual Network with V... 1 Automatic Creation of a Virtual Network with VBoxManage [1] Submitted by Steve [2] on Wed, 18/09/2013-5:46pm I am using VirtualBox to create multiple
More informationUnit: Making a move (using FTP)
Data Introduction to Unix and HPC (HPC for Wimps) Unit: Making a move (using FTP) Goals: Can login via Secure FTP and see home directory. Can transfer a file from local machine via FTP to home directory.
More informationVMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual
VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL Revised May 2017 What is VMware Horizon Client? VMware Horizon Client for Windows operating systems allows you to connect to our department VMware Horizon View
More informationA Brief Introduction to Unix
A Brief Introduction to Unix Sean Barag Drexel University March 30, 2011 Sean Barag (Drexel University) CS 265 - A Brief Introduction to Unix March 30, 2011 1 / 17 Outline 1 Directories
More informationUTA Tech Orientation Spring 2019
UTA Tech Orientation Spring 2019 Overview Why is Tech Stuff Important? The Filesystem Shell Commands File Permissions Miscellaneous Why is Tech Stuff Important? Why is TA Tech Stuff Important? Different
More informationUsing UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program
Using UNIX. UNIX is mainly a command line interface. This means that you write the commands you want executed. In the beginning that will seem inferior to windows point-and-click, but in the long run the
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationCreating Avid Projects, and Media Sharing with Small Tree TitaniumZ
When using Avid Media Composer System with Small Tree's Titanium Z storage, there are a few steps to take to share project and media files. It is important to note that While Small Tree can work in an
More informationYou can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access.
You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. Overview of Configuring FTP/SFTP Access In order to access data using the
More informationWhat is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client
1. What is VMware View 2. Connecting from Off-Campus 3. Connecting to View Desktops 4. Extra View Tips 5. What to do if something is wrong What is VMware View VMware View is a technology that allows us
More informationSecurity and File Permission. Harish Kumar.H.C Asst.Professor Department of CSE
Security and File Permission Harish Kumar.H.C Asst.Professor Department of CSE Introduction The security system in UNIX, like any other operating system, is designed to control the access to resources.
More informationGetting Started with VPN
What is a VPN? VPN (Virtual Private Network) provides you with a way to connect to the HBU campus server securely over the internet in order to access your work computer and shared drives from home. VPN
More informationRace Condition Vulnerability Lab
Concordia Institute for Information Systems Engineering - INSE 6130 1 Race Condition Vulnerability Lab Copyright c 2006-2012 Wenliang Du, Syracuse University. The development of this document is funded
More informationBasic Survival UNIX.
Basic Survival UNIX Many Unix based operating systems make available a Graphical User Interface for the sake of providing an easy way for less experienced users to work with the system. Some examples are
More informationSharePoint General Instructions
SharePoint General Instructions Table of Content What is GC Drive?... 2 Access GC Drive... 2 Navigate GC Drive... 2 View and Edit My Profile... 3 OneDrive for Business... 3 What is OneDrive for Business...
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website
More informationIntroduction. SSH Secure Shell Client 1
SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,
More informationBitnami MEAN for Huawei Enterprise Cloud
Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable
More informationTECH 4272 Operating Systems
TECH 4272 Lecture 3 2 Todd S. Canaday Adjunct Professor Herff College of Engineering sudo sudo is a program for Unix like computer operating systems that allows users to run programs with the security
More informationIntroduction to Linux Spring 2014, Section 02, Lecture 3 Jason Tang
Introduction to Linux Spring 2014, Section 02, Lecture 3 Jason Tang Topics What is an Operating System Overview of Linux Linux commands Shell Submit system What is an Operating System? Special type of
More informationCSC111 Computer Science II
CSC111 Computer Science II Lab 1 Getting to know Linux Introduction The purpose of this lab is to introduce you to the command line interface in Linux. Getting started In our labs If you are in one of
More informationRWT Network System Installation Guide
RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied
More informationYou will automatically be in your user (home) directory when you login.
Directory structure / (root) bin dev etc lib users users2 tmp These directories typically contain system libraries, executable binary files, device handlers and drivers, etc. The user home directories
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationmacos Security Checklist:
WHITE PAPER macos Security Checklist: implementing the Center for Internet Security Benchmark for macos Recommendations for securing macos The Center for Internet Security (CIS) benchmark for macos is
More informationLinux File System and Basic Commands
Linux File System and Basic Commands 0.1 Files, directories, and pwd The GNU/Linux operating system is much different from your typical Microsoft Windows PC, and probably looks different from Apple OS
More informationFilesharing. Jason Healy, Director of Networks and Systems
Filesharing Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Name of Project Here 5 1.1 Introduction.............................. 5 1.2 Initial Setup..............................
More informationUser Guide Version 2.0
User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...
More informationLING203: Corpus. March 9, 2009
LING203: Corpus March 9, 2009 Corpus A collection of machine readable texts SJSU LLD have many corpora http://linguistics.sjsu.edu/bin/view/public/chltcorpora Each corpus has a link to a description page
More informationRemote VPN Remote access for personal devices
Remote VPN Remote access for personal devices About Remote VPN Remote VPN provides staff and students with secure, authenticated remote access to personal and shared network filespace and to web-based
More informationWINDOWS CONFIGURATION
WINDOWS CONFIGURATION 1. Go to the App store on your ipad and purchase CrystalPM Signature Capture then install. 2. On the computer that contains the PDF files that you want the patients to sign: a. Go
More informationConnecting from Off-Campus to Your Office Mac Using a Windows 10 PC
University Information Technology Services Technology Outreach Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC The following describes how to set up and connect remotely to your office
More informationCpSc 1111 Lab 1 Introduction to Unix Systems, Editors, and C
CpSc 1111 Lab 1 Introduction to Unix Systems, Editors, and C Welcome! Welcome to your CpSc 111 lab! For each lab this semester, you will be provided a document like this to guide you. This material, as
More information