curl Manager Manual Contents Intro

Size: px
Start display at page:

Download "curl Manager Manual Contents Intro"

Transcription

1 curl Manager Manual Contents Intro... 1 Creating and Changing Your Password... 2 Add a Known Host... 3 Remove a Known Host... 4 Figure Out What s in an Existing known_hosts File... 4 Export Known Hosts Data... 5 Importing Known Hosts... 7 Generating New SSH Keys... 8 Importing SSH Keys... 9 Automatic Upgrade Notifications Advanced Update Settings Planned Features for Future Releases Intro The curl Manager serves two unrelated purposes. First, it provides automatic update notifications for curl. Second, it makes curl s sftp functions easier to use on Windows by creating the necessary directories and files, and providing a graphical interface for managing a known_hosts file. I decided to make the curl Manager because it s exactly what I would have wanted when I was trying to figure out how to use curl for sftp. I hope it makes your scripting and web-hacking a little less frustrating and a bit more fun.

2 Creating and Changing Your Password You will be prompted to create a password the first time you try to add or import known hosts data. To change your password: 1. Select Options from the main menu, and then select Change password. Figure 1 Menu item to change your password 2. Enter your old password, and then enter your new password twice and click OK. Figure 2 Change password window By default, new versions of OpenSSH irreversibly scramble (a.k.a. hash ) the domain names in the known_hosts file. This provides an extra layer of security, but makes it difficult to keep the entries organized. The curl Manager saves extra information in its own data file, such as the unscrambled domain names and the dates they were added, and then uses reversible encryption to scramble all of the data. The password is required for encrypting and decrypting your data. Note: The curl Manager data file, known_hosts.cbc, is located in the directory %AppData%\ConfusedByCode\cURLManager.

3 Add a Known Host Figure 3 Manage Known Hosts tab 1. Double click the known hosts list and enter or create a password. 2. Type the domain name in the domain entry box, and then hit Enter or click the add host button. 3. You will be shown the public key fingerprint for the server you are connecting to. If the fingerprint is correct, click Yes. Figure 4 Fingerprint prompt 4. The verified server will be added to your known_hosts file (%AppData%\_ssh\known_hosts), and it will appear in the known hosts list. You should now be able to use curl to transfer data via sftp connections with the listed server.

4 Note: You can open the actual known_hosts file by selecting File > View known hosts file. Remove a Known Host 1. Click anywhere on a row in the known hosts list to select the host server you want to remove. 2. Click the remove host button. 3. A window will pop up asking you to confirm your decision. Click OK. Once you confirm, the server will be removed from your known_hosts file (%AppData%\_ssh\known_hosts), and it will disappear from the known hosts list. You will no longer be able to use curl to make sftp connections to that server. Figure Out What s in an Existing known_hosts File You might have already figured out that curl looks for the known_hosts file in the %AppData%\_ssh directory, and so you might already have a known_hosts file where the curl Manager looks for one. If this is the case, the first time you use the curl Manager it will automatically import the existing known hosts into its data file and show them in the known hosts list. Figure 5 Entry from existing known_hosts file

5 If you want to figure out which entries belong to which servers, simply enter a domain name as if you were adding a new host. The curl Manager will automatically add the domain name to matching host keys. Figure 6 Host name found Note: If you remove the entry from the curl Manager, it will be removed from your known_hosts file. Export Known Hosts Data You can export the known host data from the curl Manager as a plaintext XML file, which can be imported by the curl Manager from another user account on the same PC, or on a completely different PC that has the curl Manager installed. After entering your password: 1. Select File > Export known hosts Figure 7 File > Export known hosts

6 2. Choose the folder or removable drive where you want to save the exported data, and click Save. By default, the exported file is called known_hosts.xml Figure 8 Exporting known hosts Note: The exported file is an unencrypted version of the data file used by the curl Manager. Figure 9 Plaintext known host xml data

7 Importing Known Hosts To import known hosts from an XML file: 1. Select File > Import known hosts Figure 10 File > Import known hosts 2. Browse to the folder or removable drive where the exported known hosts file was saved, and select the file. Click Open. Figure 11 Selecting a known hosts xml data file Any new hosts from the imported file will be added to the known_hosts file and the curl Manager data file. Entries will not be duplicated, so it doesn t matter if some of the imported hosts are already in the curl Manager. Note: As a security precaution, you should delete the plaintext XML file after importing the data.

8 Generating New SSH Keys Figure 12 SSH Keys tab The curl Manager includes a basic SSH key generator. It s intended to be a convenient way to generate the type of SSH key understood by curl (OpenSSH). For a more complete SSH key generator, try the free and excellent PuTTYgen, available at To create a new SSH Key pair (a public key and a private key), simply click the new key button. When the key is ready, the text below the button will change from Load or generate a key to export to New SSH key ready! The generated key will be an SSH2-RSA key with 2048 bits of data. Once the key pair has been generated, you can choose to export the OpenSSH public key, the private key, or both. To export the OpenSSH public key simply click the save public key button. To export the private key enter and confirm a password in the new password boxes, and then click the save private key button. To export a key pair, first enter and confirm a private key password in the new password boxes. Second, enter a name for your key pair in the quick pair name box. Finally, click the save quick pair button.

9 The keys will be automatically saved in %AppData%\_ssh. The private key will take the name you entered in the quick pair name box, and the public key will use the same name with a.pub file extension. For example, if you named your quick pair my_key, the private key file would be my_key, and the public key would be my_key.pub. Importing SSH Keys You can import an existing private key to save a new public or private key. The imported key can be OpenSSH format or Putty Private Key format, but the exported key will always be OpenSSH format. It s a convenient way to convert a Putty key to an OpenSSH key pair that you can use with curl, or to simply change the password or generate public keys for an existing OpenSSH key. To import a key: 1. Enter the private key password of the key you want to import in the password entry box. 2. Click the load key button. 3. Browse to the private key you want to load, and select the file. Figure 13 Loading an existing private key Once the key is loaded, you can export public and private keys the same way as you do when generating new keys. Tip: Did you know curl can actually use Pageant for agent-based logons? Simply load a key into Pageant, and run your sftp command with curl without specifying any keys. Curl will automatically use Pageant to log you in.

10 Automatic Upgrade Notifications Figure 14 Auto upgrade settings The Update Settings tab is self-explanatory: choose whether or not curl Manager checks for upgrades. You must run the curl Manager as an Administrator to change this setting. The curl Manager will check confusedbycode.com for updates every Friday at 7:05PM. If the computer is off or asleep at that time, it will skip the update check and try again the following week. If an upgrade is found you will be receive a desktop notification: Figure 15 Update notification

11 If you click on the notification, the update package will be downloaded to your %temp% folder: Figure 16 Download notification You will be notified again when the download is complete. Click the notification to install: Figure 17 Install prompt Known bug: Occasionally after the installation completes, you will receive an error message with.net debugging info. If you see this, don t panic; the upgrade was most likely successful. The curl Manager update program, UpdateNotification.exe, usually deletes the upgrade package from your temp folder after the installation completes. If you see the error message, it simply means that the updater failed to delete the temporary file.

12 Advanced Update Settings The curl Manager update program is triggered by Windows Task Scheduler. You can tweak settings like the update time and frequency by opening the task scheduler and selecting the task called curlupdater, as seen below. Figure 18 View of scheduled curlupdate task in Task Scheduler Planned Features for Future Releases Here s a list of a few features that are in the works: 1. Synchronize known hosts data with PuTTY known hosts data. 2. Bulk host verification: provide list of domains with correct fingerprint, and curl Manager will check them and add valid entries to known_hosts. 3. More options for key generation. 4. More options for updates from within the curl Manager application.

If you prefer to use your own SSH client, configure NG Admin with the path to the executable:

If you prefer to use your own SSH client, configure NG Admin with the path to the executable: Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP addresses that administrative

More information

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

SWCS 4.2 Backup Agent User s Guide Revision /20/2012 Solatech, Inc.

SWCS 4.2 Backup Agent User s Guide Revision /20/2012 Solatech, Inc. SWCS 4.2 Backup Agent User s Guide Revision 24 11/20/2012 Solatech, Inc. Contents Introduction... 3 Installation... 3 Running the Backup Agent... 3 Using the Backup Agent... 3 Configuring the Backup...

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud... Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT File Integrity Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers

More information

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs ProxyCap Help 2016 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and

More information

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal

More information

Welcome To Account Manager 2.0

Welcome To Account Manager 2.0 Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account

More information

QSalesData User Guide

QSalesData User Guide QSalesData User Guide Updated: 11/10/11 Installing the QSalesData Software... 2 Licensing the QSalesData Product... 3 Build QSalesData fields in ACT Step 2 of Install Checklist... 4 Adding the QB Data

More information

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted

More information

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows

More information

NOTE: Single user and network installation is the same. Network users will only have to download and install the program once.

NOTE: Single user and network installation is the same. Network users will only have to download and install the program once. Dear TaxTime USA Customer, Thank you for ordering TaxTime's 941/MI Unemployment Express 2013. Please print this for easy reference of download and program registration instructions. NOTE: Single user and

More information

EDISCLOSURE USER GUIDE

EDISCLOSURE USER GUIDE STATEMENT OF ECONOMIC INTERESTS edisclosure is the City s electronic Form 700 and Form 60 filing system and database. Through edisclosure, you can maintain a current list of your agency s filers by adding,

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine

More information

The following topics describe how to use backup and restore features in the Firepower System:

The following topics describe how to use backup and restore features in the Firepower System: The following topics describe how to use backup and restore features in the Firepower System: Introduction, page 1 Limitations, page 1 Backup Files, page 2 Backing up a Firepower Management Center, page

More information

INTRODUCTION ACCESS 2010

INTRODUCTION ACCESS 2010 INTRODUCTION ACCESS 2010 Overview of Ms. Access 2010 Microsoft Access is a computer application used to create and manage databases. Access Databases can store any type of information: numbers, text, and

More information

Gitlab Setup/Usage by Yifeng Zhu modified by Vince Weaver 30 January 2019

Gitlab Setup/Usage by Yifeng Zhu modified by Vince Weaver 30 January 2019 ECE271: Microcomputer Architecture and Applications University of Maine Gitlab Setup/Usage by Yifeng Zhu modified by Vince Weaver 30 January 2019 Background We will submit our labs in ECE271 via git to

More information

RIPPLESTONE SUMMARY

RIPPLESTONE SUMMARY RIPPLESTONE 3.7 - SUMMARY HOME PAGE ADDED AN ADMIN DASHBOARD (3.7.1.2) This new page is available to Super Users and Administrators and provides information about the Ripplestone system. It allows them

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to

More information

Password Memory 7 User s Guide

Password Memory 7 User s Guide C O D E : A E R O T E C H N O L O G I E S Password Memory 7 User s Guide 2007-2018 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents How secure is Password

More information

Release notes for version 3.9.2

Release notes for version 3.9.2 Release notes for version 3.9.2 What s new Overview Here is what we were focused on while developing version 3.9.2, and a few announcements: Continuing improving ETL capabilities of EasyMorph by adding

More information

ProjectNotify User Guide April User Guide

ProjectNotify User Guide April User Guide User Guide...2. Standard Installation...8. Example Installation Scenarios...9. Network Installation.12. Data Tools...13. Advanced Settings...15. Product Requirements ProjectMatrix 1 Standard Installation

More information

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.

IronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd. IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1

More information

SharePoint List Synchronizer for Excel 2007 and Documentation

SharePoint List Synchronizer for Excel 2007 and Documentation SharePoint List Synchronizer for Excel 2007 and 2010 Documentation Table of Contents I. INTRODUCTION... 3 II. OVERVIEW... 4 III. INSTALLATION... 5 IV. UNINSTALLATION... 9 V. USAGE... 10 A. SCENARIO...

More information

This document is intended to help you connect to the CVS server on a Windows system.

This document is intended to help you connect to the CVS server on a Windows system. Sourceforge CVS Access Sourceforge CVS Access... 1 Introduction... 1 Tools... 1 Generate Public / Private Keys... 1 Configuring Sourceforge Account... 4 Loading Private Keys for Authentication... 7 Testing

More information

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware

More information

Workshare Professional 10. Getting Started Guide

Workshare Professional 10. Getting Started Guide Workshare Professional 10 Getting Started Guide Introducing Workshare Professional 10 Workshare is dedicated to helping professionals compare, protect and share their documents. New features Compare Excel

More information

AccessData AD Enterprise Release Notes

AccessData AD Enterprise Release Notes AccessData AD Enterprise 6.5.1 Release Notes Document Date: 07/30/2018 2018 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

Encode Rule Explorer App v1.0.2 for IBM QRadar Documentation

Encode Rule Explorer App v1.0.2 for IBM QRadar Documentation Encode Rule Explorer App v.0.2 for IBM QRadar Documentation Encode Rule Explorer App for IBM QRadar, Copyright 207 Encode SA, All rights reserved. Revision to This Document Date Revision Description 30

More information

2010 Upgrader s Guide

2010 Upgrader s Guide Easy accounting for your business 2010 Upgrader s Guide Important upgrade tasks and information for existing QuickBooks customers. 2006 or earlier upgraders only What to know before you start Do I have

More information

Backup and Restore Introduction

Backup and Restore Introduction The ability to recover from a disaster is an essential part of any system maintenance plan. As part of your disaster recovery plan, Cisco recommends that you back up the Firepower Management Center and

More information

LAB :: Secure SHell (SSL)

LAB :: Secure SHell (SSL) LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training

More information

SIRE Solution Suite. WebCenter User Manual. A Publication Of

SIRE Solution Suite. WebCenter User Manual. A Publication Of SIRE Solution Suite An Official Manual of SIRE Technologies Document and Legislative Management Software Version 6.0 A Publication Of 2 2000-2011 SIRE Technologies Incorporated and its licensors. All rights

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

UNIVERSITY OF CYPRUS Computer Science Department

UNIVERSITY OF CYPRUS Computer Science Department UNIVERSITY OF CYPRUS Computer Science Department ΕΠΛ 660 Information Retrieval and Search Engines A guide for connecting to LInC 1 -powered cloud-based Virtual Machines Lab instructor: Pavlos Antoniou

More information

MoveIT DMZ User Guide

MoveIT DMZ User Guide MoveIT DMZ User Guide December 10, 2014 1 Index MoveIT DMZ Introduction... 1 Initial Login and Password Change... 2 Navigation... 8 Installation Instructions for the Upload / Download Wizard... 12 Uploading

More information

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server. CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

NoMachine NX Client Configuration Guide

NoMachine NX Client Configuration Guide NoMachine NX Client Configuration Guide Configuration steps for ssh key login Step 1: NoMachine NX requires keys in OpenSSH format, therefore the existing key needs to be converted into OpenSSH format.

More information

Outlook 2010 Setup Guide (POP3 Transmailaccess)

Outlook 2010 Setup Guide (POP3 Transmailaccess) Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 7 /22/2013 Copyright 2012 Smarsh, Inc. All rights reserved. Purpose: This document will assist the end user in configuring Outlook 2010

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 III. Configuring the Outlook

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Configuring SSH Public Key Authentication

Configuring SSH Public Key Authentication 6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running

More information

Automation Engine. Getting Started

Automation Engine. Getting Started Getting Started 05-2017 Contents 1. Installing Server and Clients... 4 2. Changing the Language used in the Pilot... 5 3. Starting or Updating the Pilot... 6 4. The Pilot's Main Window... 7 5. Concepts

More information

Managing Software Images Using Software Management

Managing Software Images Using Software Management CHAPTER 8 Managing Software Images Using Software Management Manually upgrading your devices to the latest software version can be an error-prone, and time-consuming process. To ensure rapid, reliable

More information

Rabbit Linux Masternode with Windows Cold Wallet

Rabbit Linux Masternode with Windows Cold Wallet Rabbit Linux Masternode with Windows Cold Wallet This is the condensed version of the video showing how to install and set up a Linux VPS with Windows cold wallet setup for a Rabbit masternode. If you

More information

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 II. Determine your version of

More information

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web. OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

Release notes for version 3.7.2

Release notes for version 3.7.2 Release notes for version 3.7.2 Important! Create a backup copy of your projects before updating to the new version. Projects saved in the new version can t be opened in versions earlier than 3.7. Breaking

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars

More information

You can use the private key.pem files to allow you to connect via SFTP on a server that only allows key access.

You can use the private key.pem files to allow you to connect via SFTP on a server that only allows key access. Products Services Portfolio Blog About Us Contact Us Support SFTP Tips & Tricks Using Keyfiles To Access SFTP Services You can use the private key.pem files to allow you to connect via SFTP on a server

More information

Aspera Connect User Guide 3.7.0

Aspera Connect User Guide 3.7.0 Aspera Connect User Guide 3.7.0 Mac OS X Revision: 3.7.0.138343 Generated: 01/19/2017 13:37 Contents 2 Contents Introduction... 3 System Requirements... 4 Setting Up Connect...5 Part 1: Installation...5

More information

VPS SETUP: What is a VPS? A VPS is a cloud server, running on a virtual machine. You can t run a masternode on your computer itself.

VPS SETUP: What is a VPS? A VPS is a cloud server, running on a virtual machine. You can t run a masternode on your computer itself. Our guide makes it easy to set up your own masternode! BEFORE YOU BEGIN, YOU WILL NEED: 1. 1,000 SUPPO s 2. The latest SuppoCoin wallet, which can always be found here: https://www.suppocoin.io 3. Two

More information

SSH and keys. Network Startup Resource Center

SSH and keys. Network Startup Resource Center SSH and keys Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Asigra Cloud Backup v13.3 DS-Notebook Client User Guide. September 2017

Asigra Cloud Backup v13.3 DS-Notebook Client User Guide. September 2017 Asigra Cloud Backup v13.3 DS-Notebook Client User Guide Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Asigra Inc. Asigra

More information

Table of Contents 1 SSH Configuration 1-1

Table of Contents 1 SSH Configuration 1-1 Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server

More information

2. This will bring you to a new window asking what type of policy you are inserting. Personal Policies. Commercial Policies. All Other Policies

2. This will bring you to a new window asking what type of policy you are inserting. Personal Policies. Commercial Policies. All Other Policies How to Insert a New Client File To insert a new client file you can do this one of two ways. The first way is to manually insert the client file through Hawksoft. You would use this method if you are writing

More information

In November 2018, the software for the Intranet version of Perinorm will be updated.

In November 2018, the software for the Intranet version of Perinorm will be updated. Release Notes for Perinorm Intranet November 2018 In November 2018, the software for the Intranet version of Perinorm will be updated. Some enhancements that will be implemented with the new software are

More information

Reference Guide. Adding a Generic File Store - Importing From a Local or Network ShipWorks Page 1 of 21

Reference Guide. Adding a Generic File Store - Importing From a Local or Network ShipWorks Page 1 of 21 Reference Guide Adding a Generic File Store - Importing From a Local or Network Folder Page 1 of 21 Adding a Generic File Store TABLE OF CONTENTS Background First Things First The Process Creating the

More information

User Guide. Application Security for Workspace Environment Management - Preview V2/ September 2017

User Guide. Application Security for Workspace Environment Management - Preview V2/ September 2017 User Guide Application Security for Workspace Environment Management - Preview V2/ September 2017 Software version: 4.4.5 Release date: September 2017 Document revision: 2 Copyright 2017 Citrix Systems,

More information

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA

More information

Principia Archive Explorer

Principia Archive Explorer Principia Archive Explorer Welcome to the Principia Archive Explorer. This tool bundles together all the historical releases you need and makes it easier for you to install, download, and export the data

More information

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette Secure SHell: Connect remotely anything, anywhere UL High Performance Computing (HPC) Team Sebastien Varrette University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 26 Summary 1 Introduction 2

More information

TAX REPORTING SUITE MODULE IDES VERSION 1712

TAX REPORTING SUITE MODULE IDES VERSION 1712 TAX REPORTING SUITE MODULE IDES VERSION 1712 USERS S MANUAL Published: Jan 2018 For the latest information and to leave feedback, please visit Vogele IT-Services at http://www.section11.ch. 2 The information

More information

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export

More information

Asigra Cloud Backup v13.3 DS-Mobile Client User Guide. September 2017

Asigra Cloud Backup v13.3 DS-Mobile Client User Guide. September 2017 Asigra Cloud Backup v13.3 DS-Mobile Client User Guide Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Asigra Inc. Asigra Inc.

More information

Recommended Maintenance Plan for Siriusware Clients for SQL server 2005

Recommended Maintenance Plan for Siriusware Clients for SQL server 2005 Recommended Maintenance Plan for Siriusware Clients for SQL server 2005 PURPOSE The purpose of this document is to describe how to automate the periodic rebuilding of indexes for the SiriusSQL database.

More information

HMIS APR v5.1 CSV Export for Sage

HMIS APR v5.1 CSV Export for Sage HMIS APR v5.1 CSV Export for Sage The HMIS APR v5.1 CSV Export is designed to meet HUD reporting requirements with the SAGE Repository. It is an export consisting of 65 separate CSV files. Similar to other

More information

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017 INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University Updated May 19, 2017 The first thing you will need is SSH. SSH

More information

Quick Start. How to start monitoring use of your computer right away.

Quick Start. How to start monitoring use of your computer right away. Quick Start Using the Scheduler Capture Types Other Recommended Settings Viewing Captured Information Viewing, Replaying and Deleting captures Silently Emailing Capture Logs Hiding the prog. from praying

More information

Using keys with SSH Rob Judd

Using keys with SSH Rob Judd Using keys with SSH Rob Judd (rjudd@mlug.missouri.edu) Introduction SSH is a drop-in replacement for telnet that allows encrypted network connections. There are two main versions, 1.5 SSH-1 and 2.0 SSH-2

More information

Upgrading Workstations To Maximizer CRM Summer 2013

Upgrading Workstations To Maximizer CRM Summer 2013 This document provides guidance for the update of individual workstation computers to Maximizer CRM Summer 2013 edition. This guide is into sections: 1. update of Maximizer Windows desktop software (and

More information

PC Agent Quick Start. Opening the Agent. Logging in to the Agent. Connected Backup. Version 8.6. Revision 0

PC Agent Quick Start. Opening the Agent. Logging in to the Agent. Connected Backup. Version 8.6. Revision 0 T E C H N I C A L N O T E Version 8.6 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on your computer, contact your

More information

Electronic Processes Day 5 Exit Files and Web Exits

Electronic Processes Day 5 Exit Files and Web Exits Electronic Processes Day 5 Exit Files and Web Exits Goals for today s training What is an Exit File How to create an Exit File How to transfer an Exit File What happens when an Exit File is received at

More information

Note, you must have Java installed on your computer in order to use Exactly. Download Java here: Installing Exactly

Note, you must have Java installed on your computer in order to use Exactly. Download Java here:   Installing Exactly Exactly: User Guide Exactly is used to safely transfer your files in strict accordance with digital preservation best practices. Before you get started with Exactly, have you discussed with the archive

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

Titan FTP Server SSH Host Key Authentication with SFTP

Titan FTP Server SSH Host Key Authentication with SFTP 2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River

More information

Integrate with HeroPM

Integrate with HeroPM Integrate with HeroPM What is Hero PM and PROMAS Central? HeroPM is the new name for what used to be called PROMAS Central. It consists of the Internet Publishing screen within the PROMAS application and

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

9.4 Authentication Server

9.4 Authentication Server 9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

INSTALLATION AND REGISTRATION MANUAL

INSTALLATION AND REGISTRATION MANUAL INSTALLATION AND REGISTRATION MANUAL www.abraxasenergy.com Installing Metrix 4.4 1. IMPORTANT: Before any software installation, make back up copies of your work! Abraxas Energy assumes no responsibility

More information

Secret Server Demo Outline

Secret Server Demo Outline Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during

More information

Deposit Wizard TellerScan Installation Guide

Deposit Wizard TellerScan Installation Guide Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3

More information

Upgrading the Server Software

Upgrading the Server Software APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining

More information

Create MedicCoin Master Node Instruction Rev2

Create MedicCoin Master Node Instruction Rev2 Create MedicCoin Master Node Instruction Rev2 1. Download MedicCoin wallet using below link https://mediccoin.com/mediccoin-window.zip 2. Unzip/extract MedicCoin-Window.zip to C:\coins\MedicCoin folder.

More information

INSTALLATION GUIDE Spring 2017

INSTALLATION GUIDE Spring 2017 INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and

More information

Question: How do I move my mobile account from the Corporate to my Personal Account?

Question: How do I move my mobile account from the Corporate to my Personal Account? Question: How do I move my mobile account from the Corporate to my Personal Account? Answer: A user leaving Nortel can move his/her account off of the corporate program and into a personal liable account.

More information

AGENT123. Full Q&A and Tutorials Table of Contents. Website IDX Agent Gallery Step-by-Step Tutorials

AGENT123. Full Q&A and Tutorials Table of Contents. Website IDX Agent Gallery Step-by-Step Tutorials AGENT123 Full Q&A and Tutorials Table of Contents Website IDX Agent Gallery Step-by-Step Tutorials WEBSITE General 1. How do I log into my website? 2. How do I change the Meta Tags on my website? 3. How

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Exporting distribution lists from Thunderbird to Outlook

Exporting distribution lists from Thunderbird to Outlook Exporting distribution lists from Thunderbird to Outlook PLEASE NOTE: Do not export the lists under Distribution Lists in your Thunderbird Address Book as these will no longer be maintained on the new

More information

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles

More information