Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.
|
|
- Dennis Skinner
- 5 years ago
- Views:
Transcription
1 Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP (32-bit) Version 3.0 Updated for 2018 Spring * as at Downoad PuTTY The official PuTTY home page is: Download PuTTY Download the PuTTY installer (putty-64bit-0.70-installer.msi*) Alternatiely, you can download the putty.zip file. Both contain seeral programs for SSH, SFTP, and SCP. *As at ; 32-bit ersions are also aailable 1
2 PuTTY Files - Installer PuTTY Files - Installer PuTTY Files Installer (2) PuTTY Files Installer (3) 2
3 PuTTY Files Installer (4) PuTTY Installed To run PuTTY after using the installer, go to the Programs menu, or, if you elected to install the desktop shortcut, to the Desktop PuTTY Installation Zip File Copy or extract the files from the zip file into a folder that is on your PATH. To find out the PATH, right click on the My Computer icon and select Properties. Then, from the Adanced tag, click on the Enironment ariables button. Or you can type path from a Command prompt window. PuTTY Installation Zip File (2) If you re not sure, just copy the PuTTY files into C:\Windows. That folder is always on the path. To run PuTTY, from the Start menu, select Run and enter putty. 3
4 Running PuTTY Setting up the Session In the Host Name (or IP address) field, enter technology.niagarac.on.ca or The Port can be 22 (the default, may not work with all College networks) or 443 (recommended -- works both inside and outside the College.) Make sure that SSH is checked off under Connection Type (it is the default). Setting up the Session (2) Window Configuration Change the font size only when maximized Set Lines of scrollback Display scrollbar in full screen mode 4
5 Window Configuration (2) Change the font to something that you can read (I like Consolas) Window Configuration (3) Set the Window title Select Clear Type for the best anti-aliasing Window Configuration (4a) Set the colours For example, Default Foreground to black (Red = 0, Green = 0, Blue = 0) and Default Background to white (Red = 255, Green = 255, Blue = 255) Window Configuration (4b) Set the colours For example, Default Foreground to black (Red = 0, Green = 0, Blue = 0) and Default Background to white (Red = 255, Green = 255, Blue = 255) 5
6 Window Configuration (4c) Set the colours For example, Default Foreground to black (Red = 0, Green = 0, Blue = 0) and Default Background to white (Red = 255, Green = 255, Blue = 255) Window Configuration (4d) Set the colours For example, Default Foreground to black (Red = 0, Green = 0, Blue = 0) and Default Background to white (Red = 255, Green = 255, Blue = 255) Window Configuration (4e) Set the colours Don t forget the cursor colours (so that you can see the character that is under the cursor) Window Configuration (4f) Set the colours Don t forget the cursor colours (so that you can see the character that is under the cursor) 6
7 Connection Settings Enable TCP keepalies (both by sending null packets and with the socket option) Change the Internet protocol ersion to IP4 Connection Settings (2) Enter your username Connection Settings (3) Later, you will set your priate key here Gie the session a name and click Sae; it will be added to the list of Saed Sessions (for future use); Click Open to connect Saing the Settings 7
8 Gie the session a name and click Sae; it will be added to the list of Saed Sessions (for future use); Click Open to connect Saing the Settings (2) Connecting: First Time You will get the Security Alert popup the first time you connect. This is normal and is a feature of the SSH protocol. Click on the Yes button. PuTTY Command Line Session Public Key Encryption You are prompted for your password. If you get it wrong, try again. Enter (Linux) commands here. Close the window or press Control+D to end the session. Run PuTTYgen to create a key. Click Generate and follow the instructions. As you moe the mouse pointer around here, the progress bar adances Sae the priate key (ignore the warning about a missing passphrase ) 8
9 Public Key Encryption (2a) Run PuTTYgen to create a key. Public Key Encryption (2b) Run PuTTYgen to create a key. Click Generate and follow the instructions. Sae the priate key (ignore the warning about a missing passphrase ) Click Generate and follow the instructions. Sae the priate key (ignore the warning about a missing passphrase ) A passphrase is some text that you remember and hae to type in, to use your priate key. It is an extra layer of security, that can be used, say, if the priate key file is on a USB flash drie. Priate key file saed on Desktop Public Key Encryption (3) Highlight and copy the Public key with the mouse. Right click, Select All, right click, Copy Public Key Encryption (4) From a PuTTY session, run the following commands then paste using the right mouse button. Press Enter, then Control-D twice (once to sae; the second time to log off) 9
10 Public Key Encryption (5) Run PuTTY again, but just Load the session, do not Open (connect) yet. Public Key Encryption (6) Set up your priate key file. Click Browse and find your priate key (.ppk) file. Public Key Encryption (7) Sae the session, so that it remembers the priate key file location. First go to Session, click on your session under Saed Sessions, click Sae Finally, click Open to connect. Public Key Encryption (DONE) Now when you connect, PuTTY will log in automatically (yet securely.) For CTEC1767 Lab 6, this completes Part A of the lab. Take a screenshot of your PuTTY window showing this type of message. 10
11 Public Key Encryption -- Troubleshooting You may get an error message saying Serer refused our key you can still log on with your password. Public Key Encryption Troubleshooting (2) This can be caused by: An old (stale) public key in the authorized_keys file A corrupted authorized_keys file Spelling the authorized_keys filename incorrectly Wrong permissions on the authorized_keys file The Security-Enhanced Linux (selinux) software Public Key Encryption Troubleshooting (3a) Re-creating the authorized_keys file. First log on using your password: Public Key Encryption Troubleshooting (3b) Step 1a. Make a backup of the old authorized_keys file (if it exists; if not you will get an error message. Use the Tab key to help you complete filenames. cp.ssh/authorized_keys.ssh/authorized_keys.old Step 1b. Remoe the old authorized_keys file. rm -f.ssh/authorized_keys 11
12 Public Key Encryption Troubleshooting (3c) Step 2a. Open your existing priate key file, to select and copy the matching public key. Here, my priate key file was saed on the Windows Desktop. I can right click on the file, and then choose Edit with PuTTYgen to open it. Public Key Encryption Troubleshooting (3d) Step 2b. Create a new authorized_keys file and paste your public key. Pay attention to the correct spelling. Press Enter, then Control-D after you paste. cat >.ssh/authorized_keys ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEApuwpOh/0Ii2Q5xlibOoV2X++sfT4t1xB3jpmATMsfcQoh8cAj3YRFte7SpIX ZTdjkoAbnfLQ0FD+lSLjk/3PSr3FMxKEfwFD7Mfpeh8ylSqGqIWpn1oOjI5PMJdqKDrgtBGeK6bPItEKBQf2mL/S 937ftng3o8WkbcsL3VyCqn+AqAuP3/yksKq1g++l8d9nOVfw+NU3Rk8lTWUtNgTyyJgZisMyjNuHRzl6FuAoT4y BfZqV04PQsVBn0TklJCPgsPHZU/FhlaeHb4w4+14cuM9ZEnLWTQjQBtNaV+zWaVUElBbVhRDRzj5cxtx2e8Mg/ dokaumixpjqee1s33w== rsa-key Step 3. Apply the correct filesystem permissions. chmod 644.ssh/authorized_keys Step 4. Control-D to log off/close PuTTY. Restart PuTTY, reload your session and try to connect again. Appendix Setting Up WinSCP to use your PuTTY keys WinSCP When you install WinSCP *, it may offer to import any existing PuTTY settings. WinSCP is actually built on top of the PuTTY code base. You can also configure WinSCP at any time. *As at
13 WinSCP Installation WinSCP Installation (2) Like FileZilla, WinSCP is licensed under The GPL. Just accept the defaults. Howeer, PuTTY is licensed under the MIT licence, and is considered Open Source software (as opposed to Free Software; the two categories are often combined ) WinSCP Installation (3) WinSCP Installation (4) I prefer the Commander * Interface (the default) it is similar to FileZilla FTP Client. Click on Install. * 13
14 WinSCP Installation (5) WinSCP (Startup) The WinSCP installer will offer to import PuTTY sessions (which it finds in the Windows Registry) click Yes. Check off the one(s) that you want and click OK. Click on your PuTTY profile and then Login to connect. WinSCP (Connected) WinSCP Manual Setup If you need to Set up another Profile, It is similar To the FileZilla FTP Client s Site Manager. Your PC s files are here. Your files on the serer are here. Click on New Site 14
15 WinSCP Manual Setup (2) WinSCP Manual Setup (3) Enter the Host name and User name only Then click on Adanced... to set up your key If you change the port from 22 to 443, reset the File Protocol to SCP. From the Authentication category, click on the browse button to select your PuTTY priate key (.ppk) file WinSCP Manual Setup (4) WinSCP Login Click Sae to store the settings (the button changes name to Edit after you sae) Click Login to connect Like PuTTY, the first time you connect with WinSCP asks if you trust the computer that you are connecting to 15
16 WinSCP - DONE Like FileZilla FTP Client, your local files are shown on the left side, and the remote files are shown on the right. Simply drag from left-to-right/right-to-left to upload/download All transfers are encrypted using SSH 16
Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing
Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Version 2.0 Updated for 2017 Winter Software* Microsoft Windows 7 (64-bit) PuTTY 0.67 PuTTYgen
More informationSetting up PuTTY. Version Updated for 2015 Fall (with corrections)
Setting up PuTTY CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906 Internet Computing Version 1.9.2 Updated for 2015 Fall (with corrections)
More informationSetting up PuTTY. Software* Downoad PuTTY. Download PuTTY Download the putty.zip file. It contains several programs for SSH, SFTP, and SCP.
Software* Setting up PuTTY Microsoft Windows 7 PuTTY 0.65 PuTTYgen 0.65 WinSCP 5.7.5 CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906
More informationYou can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.
CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection
More informationAuthor A.Kishore/Sachin WinSCP
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationWinSCP. Author A.Kishore/Sachin
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationFirewalls can prevent access to the Unix Servers. Please make sure any firewall software or hardware allows access through Port 22.
EINSTEIN OVERVIEW Einstein (Einstein.franklin.edu) and Codd (codd.franklin.edu) are two servers that are used for many Computer Science (COMP) courses. Students will be directed to use either Einstein
More informationKey File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171
Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY
More informationLAB :: Secure SHell (SSL)
LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training
More informationBitnami Apache Solr for Huawei Enterprise Cloud
Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,
More informationSetting up a Chaincoin Masternode
Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version
More informationRemote Desktop How to guide
CaseMap Remote Desktop for Windows User Contents How to open Remote Desktop Connection and Login to the Terminal Server... 2 How to save your connection settings and create a shortcut on your desktop...
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationWhat is Secure. Authenticated I know who I am talking to. Our communication is Encrypted
Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers
More informationInstalling the WinSCP Secure FTP Client
Draft 0.9 Page 1 of 6 Installing the WinSCP Secure FTP Client This document will instruct you to install the WinSCP application that will provide Secure FTP (SFTP) access to your website folder. So why
More informationKB How to upload large files to a JTAC Case
KB23337 - How to upload large files to a JTAC Case SUMMARY: This article explains how to attach/upload files larger than 10GB to a JTAC case. It also and describes what files can be attached/uploaded to
More informationxseries Systems Management IBM Diagnostic Data Capture 1.0 Installation and User s Guide
xseries Systems Management IBM Diagnostic Data Capture 1.0 Installation and User s Guide Note Before using this information and the product it supports, read the general information in Appendix C, Notices,
More informationBitnami MySQL for Huawei Enterprise Cloud
Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load
More informationBitnami MariaDB for Huawei Enterprise Cloud
Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)
More informationUNIVERSITY OF CYPRUS Computer Science Department
UNIVERSITY OF CYPRUS Computer Science Department ΕΠΛ 660 Information Retrieval and Search Engines A guide for connecting to LInC 1 -powered cloud-based Virtual Machines Lab instructor: Pavlos Antoniou
More informationCryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia
Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationCryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal
More informationBitnami MEAN for Huawei Enterprise Cloud
Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable
More informationFWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files
FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware
More informationFEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs
FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA
More informationLab #5 Guide: Installing Ubuntu as a Virtual Machine
Lab #5 Guide: Installing Ubuntu as a Virtual Machine CTEC1863/2018F Operating Systems Mike Boldin Tools, Materials and Equipment Oracle VirtualBox software official site: https://www.virtualbox.org/wiki/downloads
More informationSSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:
SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows
More informationRabbit Linux Masternode with Windows Cold Wallet
Rabbit Linux Masternode with Windows Cold Wallet This is the condensed version of the video showing how to install and set up a Linux VPS with Windows cold wallet setup for a Rabbit masternode. If you
More informationProject #6: Using ssh, scp and sftp with Key-Based Authentication
Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our
More informationLab #9: Basic Linux Networking
CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use
More informationssh and handson Matsuzaki maz Yoshinobu 1
ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted
More informationSmartCash SmartNode SCRIPT Setup Guide v2.2. Windows 10. Date: 20/02/2018. By (Jazz) yoyomonkey
SmartCash SmartNode SCRIPT Setup Guide v2.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at
More informationUsing Blackboard Drive to upload/manage content in Blackboard Learn
Using Blackboard Drive to upload/manage content in Blackboard Learn Downloading and Installing Blackboard Drive 1. Login to Blackboard Learn, and click on the Utilities Tab. 2. Locate the Blackboard Drive
More informationStart by launching Mozilla To start making a web page, go to File -> New -> Composer Page
Creating a Web Page using Mozilla Composer- A Free Open Source Application Emily Hebard IT Lab School of Information University of Texas at Austin Spring 2003 Objectives Orient to the Mozilla Composer
More informationTelnet/SSH. Connecting to Hosts. Internet Technology 1
Telnet/SSH Connecting to Hosts Internet Technology 1 What is Telnet? Method for connecting to hosts Enables remote login (rlogin) to computers on the Internet One computer can connect to another to use
More informationCryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan
Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted
More informationIntroduction to Linux Workshop 2. The George Washington University SEAS Computing Facility
Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config
More informationIBM Tivoli Storage Manager for Windows Version Tivoli Monitoring for Tivoli Storage Manager
IBM Tioli Storage Manager for Windows Version 7.1.0 Tioli Monitoring for Tioli Storage Manager IBM Tioli Storage Manager for Windows Version 7.1.0 Tioli Monitoring for Tioli Storage Manager Note: Before
More informationMoving HRtrack to a new computer
First Reference Moving HRtrack to a new computer Process at a Glance Confirm the location of your HRtrack data Install HRtrack on the new computer Copy the HRtrack data folder from the old computer to
More informationLab Zero: A First Experiment Using GENI and Jacks Tool
Lab Zero: A First Experiment Using GENI and Jacks Tool These instructions are at: http://tinyurl.com/geni labzero Overview This is a first, simple experiment on GENI useful for familiarizing new experimenters
More informationTitan FTP Server SSH Host Key Authentication with SFTP
2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River
More informationClick Studios. Passwordstate. Remote Session Launcher. Installation Instructions
Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
More informationIBM Spectrum Protect Snapshot for Oracle Version What's new Supporting multiple Oracle databases with a single instance IBM
IBM Spectrum Protect Snapshot for Oracle Version 8.1.4 What's new Supporting multiple Oracle databases with a single instance IBM IBM Spectrum Protect Snapshot for Oracle Version 8.1.4 What's new Supporting
More informationFlex Linux Masternode with Windows Cold Wallet
Flex Linux Masternode with Windows Cold Wallet This is the condensed version of the video showing how to install and set up a Linux VPS with local cold wallet setup for a Flexinodes masternode. If you
More informationVirtual Desktop Infrastructure Setup for MacOS
Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile
More informationVirtual Desktop Infrastructure Setup for MacOS
Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile
More informationUsing LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs.
Section 1-7 Using LaunchPad This section: Describes how to use LaunchPad to run your access control programs. Describes how to change your login name and password Describes how to add new operators. Describes
More informationUser pages for RM Portico
Using gives you access to your files on your school or college network from a browser on any computer (including desktops, laptops, tablets, netbooks and smartphones; for more information see Appendix
More informationLab Zero: A First Experiment Using GENI and Jacks Tool
GENIExperimenter/Tutorials/jacks/GettingStarted_PartI/Procedure GENI: geni 2/27/16, 14:35 Lab Zero: A First Experiment Using GENI and Jacks Tool These instructions are at: http://tinyurl.com/geni-labzero
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH
More informationNoMachine NX Client Configuration Guide
NoMachine NX Client Configuration Guide Configuration steps for ssh key login Step 1: NoMachine NX requires keys in OpenSSH format, therefore the existing key needs to be converted into OpenSSH format.
More informationDatathon 2018 Connecting to MicroStrategy on AWS Cloud
Datathon 2018 Connecting to MicroStrategy on AWS Cloud Introduction This document describes how to connect to MicroStrategy on AWS cloud. The first part will show screenshots and introduction to the MicroStrategy
More informationLab - Examining Telnet and SSH in Wireshark
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices
More informationImmersion Day. Getting Started with Linux on Amazon EC2
July 2018 Table of Contents Overview... 3 Create a new EC2 IAM Role... 4 Create a new Key Pair... 5 Launch a Web Server Instance... 8 Connect to the server... 14 Using PuTTY on Windows... 15 Configure
More informationUsing. Quick Guide. Contents. Connecting to an FTP server. Using the Quick Connect bar. From FileZilla Wiki
Using From FileZilla Wiki Contents 1 Quick Guide 1.1 Connecting to an FTP server 1.1.1 Using the Quick Connect bar 1.1.2 Using Site Manager 1.1.3 Special case: Servers in LAN 1.2 Navigating on the server
More informationInstalling and Upgrading Cisco Network Registrar Virtual Appliance
CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar
More informationLinux Tutorial #1. Introduction. Login to a remote Linux machine. Using vim to create and edit C++ programs
Linux Tutorial #1 Introduction The Linux operating system is now over 20 years old, and is widely used in industry and universities because it is fast, flexible and free. Because Linux is open source,
More informationHow to set up an Amazon Work Profile for Windows 8
How to set up an Amazon Work Profile for Windows 8 Setting up a new profile for Windows 8 requires you to navigate some screens that may lead you to create the wrong type of account. By following this
More informationHR-Lite Database & Web Service Setup Guide
HR-Lite Database & Web Service Setup Guide Version: 1.00 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,
More informationSetting up FT3000 and version on Windows 7. This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC
Setting up FT3000 and version 3.0.1 on Windows 7 This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC PROBLEM: Computer being updated from XP to WIN 7 or 8. New PC does not
More informationInstallation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version
Installation Guide 3CX CRM Plugin for ConnectWise Single Tenant Version "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may
More informationQuick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1
Quick Note 24 Extracting the debug.txt file from a TransPort Digi Technical Support February 2016 Page 1 Contents 1 Introduction... 3 2 Version... 4 3 FTP method... 5 3.1 FTP Using FileZilla FTP Client...
More informationInstructions for MX350 Firmware Upload
Instructions for MX350 Firmware Upload MX350 Document AN10048 Page 1 of 39 Contents Section Description Page 1 Requirements 3 2 Install MX350 Setup Software 3 3 Download MX350 Firmware 4 4 Connect MX350
More informationThis document is intended to help you connect to the CVS server on a Windows system.
Sourceforge CVS Access Sourceforge CVS Access... 1 Introduction... 1 Tools... 1 Generate Public / Private Keys... 1 Configuring Sourceforge Account... 4 Loading Private Keys for Authentication... 7 Testing
More informationEAN-Firmware Upgrade Utility
EAN-Firmware Upgrade Utility PN: EAN-Firmware-Upgrade-Utility 8/17/2018 SightLine Applications, Inc Contact: Web: sightlineapplications. com Sales: sales@sightlineapplications. com Support: support@sightlineapplications.
More informationWindows 8.1 User Guide for ANU Staff
Windows 8.1 User Guide for ANU Staff This guide has been created to assist with basic tasks and navigating Windows 8.1. Further tips for using Windows 8.1 can be found on the IT Services website, or by
More informationWireless Setup Instructions
Wireless Setup Instructions THESE INSTRUCTIONS ARE VERY IMPORTANT TO SECURE YOUR WIRELESS NETWORK The purpose of this procedure is to "lock" your router so other users can not access your network without
More informationIBM System Migration Assistant 4.1. User s Guide SC90-P288-70
IBM System Migration Assistant 4.1 User s Guide SC90-P288-70 Note: Before using this information and the product it supports, read the general information in Appendix D, Notices, on page 81. Third Edition
More informationInstructions for Installing FlashUpdate and Downloading Updates for NPRT 2200 Noise Power Ratio Test Set
Instructions for Installing FlashUpdate and Downloading Updates for NPRT 2200 Noise Power Ratio Test Set Updates to the instrument firmware are available from the Applied Instruments website. Requirements
More informationIBM System Migration Assistant 4.2. User s Guide
IBM System Migration Assistant 4.2 User s Guide IBM System Migration Assistant 4.2 User s Guide Note: Before using this information and the product it supports, read the general information in Appendix
More informationTYPO3 Editing Guide Contents
TYPO3 Editing Guide Contents Introduction... 2 Logging in... 2 Selecting your Workspace for editing... 2 Working with Content Elements... 3 Working in the Editing Window... 4 Pasting content from MS Word
More informationConnectivity Guide for Oracle Databases
IBM InfoSphere DataStage and QualityStage Version 9 Release 1 Connectiity Guide for Oracle Databases SC19-3842-01 IBM InfoSphere DataStage and QualityStage Version 9 Release 1 Connectiity Guide for Oracle
More informationIBM i Version 7.2. Security Service Tools IBM
IBM i Version 7.2 Security Serice Tools IBM IBM i Version 7.2 Security Serice Tools IBM Note Before using this information and the product it supports, read the information in Notices on page 37. This
More informationSmartCVS Tutorial. Starting the putty Client and Setting Your CVS Password
SmartCVS Tutorial Starting the putty Client and Setting Your CVS Password 1. Open the CSstick folder. You should see an icon or a filename for putty. Depending on your computer s configuration, it might
More informationLotusLive. LotusLive Engage and LotusLive Connections User's Guide
LotusLie LotusLie Engage and LotusLie Connections User's Guide LotusLie LotusLie Engage and LotusLie Connections User's Guide Note Before using this information and the product it supports, read the information
More informationVirtual Machine Connection Guide for AWS Labs
Virtual Machine Connection Guide for AWS Labs Thank you for participating in our hands-on workshop. We are glad to have you in our class! This class relies on our accompanying lab environment which provides
More informationConfiguring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3
Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 From Cisco s website, here are the minimum requirements for CCP 2.7 and CCP 2.8: The following info comes from many
More informationST NICHOLAS COLLEGE RABAT MIDDLE SCHOOL HALF YEARLY EXAMINATIONS February 2016
ST NICHOLAS COLLEGE RABAT MIDDLE SCHOOL HALF YEARLY EXAMINATIONS February 2016 Mark Level 5-8 Year 7 Information and Communication Technology TIME: 1h 30min Question 1 2 3 4 5 6 7 Global Mark Max. Mark
More informationBitnami JRuby for Huawei Enterprise Cloud
Bitnami JRuby for Huawei Enterprise Cloud Description JRuby is a 100% Java implementation of the Ruby programming language. It is Ruby for the JVM. JRuby provides a complete set of core built-in classes
More informationImmotec Systems, Inc. SQL Server 2008 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationStudent Website Setup
In this course, students upload assignments to their websites hosted on the coislinux.austincc.edu server. Each student is supplied with a password protected account to access their individual websites.
More informationRegistration Authority Desktop Guide
IBM SecureWay Trust Authority Registration Authority Desktop Guide Version 3 Release 1.1 SH09-4530-01 IBM SecureWay Trust Authority Registration Authority Desktop Guide Version 3 Release 1.1 SH09-4530-01
More informationIf you prefer to use your own SSH client, configure NG Admin with the path to the executable:
Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP addresses that administrative
More informationRoss Whetten, North Carolina State University
Your First EC2 Cloud Computing Session Jan 2013 Ross Whetten, North Carolina State University BIT815 notes 1. After you set up your AWS account, and you receive the confirmation email from Amazon Web Services
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine
More informationWindows 2000 Safe Mode
LAB PROCEDURE 29 Windows 2000 Safe Mode OBJECTIVES 1. Restart and try various startup options. RESOURCES Troubleshooting 1. Marcraft 8000 Trainer with Windows 2000 installed 2. A PS2 mouse 3. A LAN connection
More informationNew User Tutorial. OSU High Performance Computing Center
New User Tutorial OSU High Performance Computing Center TABLE OF CONTENTS Logging In... 3-5 Windows... 3-4 Linux... 4 Mac... 4-5 Changing Password... 5 Using Linux Commands... 6 File Systems... 7 File
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationEnable SSH Access on the Tenable Virtual Appliance (4.4.x-4.7.x) Last Revised: February 27, 2018
Enable SSH Access on the Tenable Virtual Appliance (4.4.x-4.7.x) Last Revised: February 27, 2018 Table of Contents Introduction 3 Requirements 4 Terminology 5 Generate the Key File 6 Generate a Key for
More informationSupport Backups and Secure Transfer Server Changes - i-cam
Support Backups and Secure Transfer Server Changes - i-cam 3.1.24 Contents What is the Secure Transfer Server?... 2 Initial Setup in i-cam 3.1.24... 2 Getting your account credentials... 2 Setting your
More informationAPP-J: WHAT IS APPLICATION JUKEBOX?
APP-J: WHAT IS APPLICATION JUKEBOX? Use Application Jukebox (App-J) to run University software on any Windows PC or laptop. Launch apps from the Application Jukebox web page Install the Application Jukebox
More informationRicoh Managed File Transfer (MFT) User Guide
Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN
More informationThe Cisco HCM-F Administrative Interface
CHAPTER 5 This chapter contains information on the following topics: Overview of Cisco HCM-F Administrative Interface, page 5-1 Browser Support, page 5-2 Login and Logout, page 5-4 Online Help, page 5-5
More informationLab Configure Basic AP security through GUI
Lab 8.3.1.1 Configure Basic AP security through GUI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following objectives:
More informationTerraSAR-X Services Data Download via FTPS or Aspera Connect. Version 1.1. AIRBUS DEFENCE AND SPACE Intelligence
TerraSAR-X Services Data Download via FTPS or Aspera Connect Version 1.1 AIRBUS DEFENCE AND SPACE Intelligence 1 Common For accessing and downloading TerraSAR-X Services data either FTPS or Aspera Connect
More informationSmartCash SmartNode Setup Guide v1.2. Windows 10. Date: 13/01/2018. By (Jazz) yoyomonkey
SmartCash SmartNode Setup Guide v1.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at the casual
More informationPassword Memory 7 User s Guide
C O D E : A E R O T E C H N O L O G I E S Password Memory 7 User s Guide 2007-2018 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents How secure is Password
More informationImmersion Day. Getting Started with Linux on Amazon EC2
January 2017 Table of Contents Overview... 3 Create a new Key Pair... 4 Launch a Web Server Instance... 6 Browse the Web Server... 13 Appendix Additional EC2 Concepts... 14 Change the Instance Type...
More informationBitnami Cassandra for Huawei Enterprise Cloud
Bitnami Cassandra for Huawei Enterprise Cloud Description Apache Cassandra is an open source distributed database management system designed to handle large amounts of data across many commodity servers,
More information