curl Manager Manual Contents Intro
|
|
- Alyson Hoover
- 6 years ago
- Views:
Transcription
1 curl Manager Manual Contents Intro... 1 Creating and Changing Your Password... 2 Add a Known Host... 3 Remove a Known Host... 4 Figure Out What s in an Existing known_hosts File... 4 Export Known Hosts Data... 5 Importing Known Hosts... 7 Generating New SSH Keys... 8 Importing SSH Keys... 9 Automatic Upgrade Notifications Advanced Update Settings Planned Features for Future Releases Intro The curl Manager serves two unrelated purposes. First, it provides automatic update notifications for curl. Second, it makes curl s sftp functions easier to use on Windows by creating the necessary directories and files, and providing a graphical interface for managing a known_hosts file. I decided to make the curl Manager because it s exactly what I would have wanted when I was trying to figure out how to use curl for sftp. I hope it makes your scripting and web-hacking a little less frustrating and a bit more fun.
2 Creating and Changing Your Password You will be prompted to create a password the first time you try to add or import known hosts data. To change your password: 1. Select Options from the main menu, and then select Change password. Figure 1 Menu item to change your password 2. Enter your old password, and then enter your new password twice and click OK. Figure 2 Change password window By default, new versions of OpenSSH irreversibly scramble (a.k.a. hash ) the domain names in the known_hosts file. This provides an extra layer of security, but makes it difficult to keep the entries organized. The curl Manager saves extra information in its own data file, such as the unscrambled domain names and the dates they were added, and then uses reversible encryption to scramble all of the data. The password is required for encrypting and decrypting your data. Note: The curl Manager data file, known_hosts.cbc, is located in the directory %AppData%\ConfusedByCode\cURLManager.
3 Add a Known Host Figure 3 Manage Known Hosts tab 1. Double click the known hosts list and enter or create a password. 2. Type the domain name in the domain entry box, and then hit Enter or click the add host button. 3. You will be shown the public key fingerprint for the server you are connecting to. If the fingerprint is correct, click Yes. Figure 4 Fingerprint prompt 4. The verified server will be added to your known_hosts file (%AppData%\_ssh\known_hosts), and it will appear in the known hosts list. You should now be able to use curl to transfer data via sftp connections with the listed server.
4 Note: You can open the actual known_hosts file by selecting File > View known hosts file. Remove a Known Host 1. Click anywhere on a row in the known hosts list to select the host server you want to remove. 2. Click the remove host button. 3. A window will pop up asking you to confirm your decision. Click OK. Once you confirm, the server will be removed from your known_hosts file (%AppData%\_ssh\known_hosts), and it will disappear from the known hosts list. You will no longer be able to use curl to make sftp connections to that server. Figure Out What s in an Existing known_hosts File You might have already figured out that curl looks for the known_hosts file in the %AppData%\_ssh directory, and so you might already have a known_hosts file where the curl Manager looks for one. If this is the case, the first time you use the curl Manager it will automatically import the existing known hosts into its data file and show them in the known hosts list. Figure 5 Entry from existing known_hosts file
5 If you want to figure out which entries belong to which servers, simply enter a domain name as if you were adding a new host. The curl Manager will automatically add the domain name to matching host keys. Figure 6 Host name found Note: If you remove the entry from the curl Manager, it will be removed from your known_hosts file. Export Known Hosts Data You can export the known host data from the curl Manager as a plaintext XML file, which can be imported by the curl Manager from another user account on the same PC, or on a completely different PC that has the curl Manager installed. After entering your password: 1. Select File > Export known hosts Figure 7 File > Export known hosts
6 2. Choose the folder or removable drive where you want to save the exported data, and click Save. By default, the exported file is called known_hosts.xml Figure 8 Exporting known hosts Note: The exported file is an unencrypted version of the data file used by the curl Manager. Figure 9 Plaintext known host xml data
7 Importing Known Hosts To import known hosts from an XML file: 1. Select File > Import known hosts Figure 10 File > Import known hosts 2. Browse to the folder or removable drive where the exported known hosts file was saved, and select the file. Click Open. Figure 11 Selecting a known hosts xml data file Any new hosts from the imported file will be added to the known_hosts file and the curl Manager data file. Entries will not be duplicated, so it doesn t matter if some of the imported hosts are already in the curl Manager. Note: As a security precaution, you should delete the plaintext XML file after importing the data.
8 Generating New SSH Keys Figure 12 SSH Keys tab The curl Manager includes a basic SSH key generator. It s intended to be a convenient way to generate the type of SSH key understood by curl (OpenSSH). For a more complete SSH key generator, try the free and excellent PuTTYgen, available at To create a new SSH Key pair (a public key and a private key), simply click the new key button. When the key is ready, the text below the button will change from Load or generate a key to export to New SSH key ready! The generated key will be an SSH2-RSA key with 2048 bits of data. Once the key pair has been generated, you can choose to export the OpenSSH public key, the private key, or both. To export the OpenSSH public key simply click the save public key button. To export the private key enter and confirm a password in the new password boxes, and then click the save private key button. To export a key pair, first enter and confirm a private key password in the new password boxes. Second, enter a name for your key pair in the quick pair name box. Finally, click the save quick pair button.
9 The keys will be automatically saved in %AppData%\_ssh. The private key will take the name you entered in the quick pair name box, and the public key will use the same name with a.pub file extension. For example, if you named your quick pair my_key, the private key file would be my_key, and the public key would be my_key.pub. Importing SSH Keys You can import an existing private key to save a new public or private key. The imported key can be OpenSSH format or Putty Private Key format, but the exported key will always be OpenSSH format. It s a convenient way to convert a Putty key to an OpenSSH key pair that you can use with curl, or to simply change the password or generate public keys for an existing OpenSSH key. To import a key: 1. Enter the private key password of the key you want to import in the password entry box. 2. Click the load key button. 3. Browse to the private key you want to load, and select the file. Figure 13 Loading an existing private key Once the key is loaded, you can export public and private keys the same way as you do when generating new keys. Tip: Did you know curl can actually use Pageant for agent-based logons? Simply load a key into Pageant, and run your sftp command with curl without specifying any keys. Curl will automatically use Pageant to log you in.
10 Automatic Upgrade Notifications Figure 14 Auto upgrade settings The Update Settings tab is self-explanatory: choose whether or not curl Manager checks for upgrades. You must run the curl Manager as an Administrator to change this setting. The curl Manager will check confusedbycode.com for updates every Friday at 7:05PM. If the computer is off or asleep at that time, it will skip the update check and try again the following week. If an upgrade is found you will be receive a desktop notification: Figure 15 Update notification
11 If you click on the notification, the update package will be downloaded to your %temp% folder: Figure 16 Download notification You will be notified again when the download is complete. Click the notification to install: Figure 17 Install prompt Known bug: Occasionally after the installation completes, you will receive an error message with.net debugging info. If you see this, don t panic; the upgrade was most likely successful. The curl Manager update program, UpdateNotification.exe, usually deletes the upgrade package from your temp folder after the installation completes. If you see the error message, it simply means that the updater failed to delete the temporary file.
12 Advanced Update Settings The curl Manager update program is triggered by Windows Task Scheduler. You can tweak settings like the update time and frequency by opening the task scheduler and selecting the task called curlupdater, as seen below. Figure 18 View of scheduled curlupdate task in Task Scheduler Planned Features for Future Releases Here s a list of a few features that are in the works: 1. Synchronize known hosts data with PuTTY known hosts data. 2. Bulk host verification: provide list of domains with correct fingerprint, and curl Manager will check them and add valid entries to known_hosts. 3. More options for key generation. 4. More options for updates from within the curl Manager application.
If you prefer to use your own SSH client, configure NG Admin with the path to the executable:
Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP addresses that administrative
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationKey File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171
Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY
More informationSWCS 4.2 Backup Agent User s Guide Revision /20/2012 Solatech, Inc.
SWCS 4.2 Backup Agent User s Guide Revision 24 11/20/2012 Solatech, Inc. Contents Introduction... 3 Installation... 3 Running the Backup Agent... 3 Using the Backup Agent... 3 Configuring the Backup...
More informationAdobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data
More informationWelcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT File Integrity Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one
More informationIBM Proventia Management SiteProtector Policies and Responses Configuration Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,
More informationCryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia
Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers
More informationProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs
ProxyCap Help 2016 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
More informationCryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal
More informationWelcome To Account Manager 2.0
Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account
More informationQSalesData User Guide
QSalesData User Guide Updated: 11/10/11 Installing the QSalesData Software... 2 Licensing the QSalesData Product... 3 Build QSalesData fields in ACT Step 2 of Install Checklist... 4 Adding the QB Data
More informationCryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan
Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted
More informationSSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:
SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows
More informationNOTE: Single user and network installation is the same. Network users will only have to download and install the program once.
Dear TaxTime USA Customer, Thank you for ordering TaxTime's 941/MI Unemployment Express 2013. Please print this for easy reference of download and program registration instructions. NOTE: Single user and
More informationEDISCLOSURE USER GUIDE
STATEMENT OF ECONOMIC INTERESTS edisclosure is the City s electronic Form 700 and Form 60 filing system and database. Through edisclosure, you can maintain a current list of your agency s filers by adding,
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine
More informationThe following topics describe how to use backup and restore features in the Firepower System:
The following topics describe how to use backup and restore features in the Firepower System: Introduction, page 1 Limitations, page 1 Backup Files, page 2 Backing up a Firepower Management Center, page
More informationINTRODUCTION ACCESS 2010
INTRODUCTION ACCESS 2010 Overview of Ms. Access 2010 Microsoft Access is a computer application used to create and manage databases. Access Databases can store any type of information: numbers, text, and
More informationGitlab Setup/Usage by Yifeng Zhu modified by Vince Weaver 30 January 2019
ECE271: Microcomputer Architecture and Applications University of Maine Gitlab Setup/Usage by Yifeng Zhu modified by Vince Weaver 30 January 2019 Background We will submit our labs in ECE271 via git to
More informationRIPPLESTONE SUMMARY
RIPPLESTONE 3.7 - SUMMARY HOME PAGE ADDED AN ADMIN DASHBOARD (3.7.1.2) This new page is available to Super Users and Administrators and provides information about the Ripplestone system. It allows them
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to
More informationPassword Memory 7 User s Guide
C O D E : A E R O T E C H N O L O G I E S Password Memory 7 User s Guide 2007-2018 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents How secure is Password
More informationRelease notes for version 3.9.2
Release notes for version 3.9.2 What s new Overview Here is what we were focused on while developing version 3.9.2, and a few announcements: Continuing improving ETL capabilities of EasyMorph by adding
More informationProjectNotify User Guide April User Guide
User Guide...2. Standard Installation...8. Example Installation Scenarios...9. Network Installation.12. Data Tools...13. Advanced Settings...15. Product Requirements ProjectMatrix 1 Standard Installation
More informationIronSync File Synchronization Server. IronSync FILE SYNC SERVER. User Manual. Version 2.6. May Flexense Ltd.
IronSync FILE SYNC SERVER User Manual Version 2.6 May 2014 www.ironsync.com info@flexense.com 1 1 Product Overview...3 2 Product Installation Procedure...4 3 Using IronSync Client GUI Application...5 3.1
More informationSharePoint List Synchronizer for Excel 2007 and Documentation
SharePoint List Synchronizer for Excel 2007 and 2010 Documentation Table of Contents I. INTRODUCTION... 3 II. OVERVIEW... 4 III. INSTALLATION... 5 IV. UNINSTALLATION... 9 V. USAGE... 10 A. SCENARIO...
More informationThis document is intended to help you connect to the CVS server on a Windows system.
Sourceforge CVS Access Sourceforge CVS Access... 1 Introduction... 1 Tools... 1 Generate Public / Private Keys... 1 Configuring Sourceforge Account... 4 Loading Private Keys for Authentication... 7 Testing
More informationFWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files
FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware
More informationWorkshare Professional 10. Getting Started Guide
Workshare Professional 10 Getting Started Guide Introducing Workshare Professional 10 Workshare is dedicated to helping professionals compare, protect and share their documents. New features Compare Excel
More informationAccessData AD Enterprise Release Notes
AccessData AD Enterprise 6.5.1 Release Notes Document Date: 07/30/2018 2018 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues
More informationEncode Rule Explorer App v1.0.2 for IBM QRadar Documentation
Encode Rule Explorer App v.0.2 for IBM QRadar Documentation Encode Rule Explorer App for IBM QRadar, Copyright 207 Encode SA, All rights reserved. Revision to This Document Date Revision Description 30
More information2010 Upgrader s Guide
Easy accounting for your business 2010 Upgrader s Guide Important upgrade tasks and information for existing QuickBooks customers. 2006 or earlier upgraders only What to know before you start Do I have
More informationBackup and Restore Introduction
The ability to recover from a disaster is an essential part of any system maintenance plan. As part of your disaster recovery plan, Cisco recommends that you back up the Firepower Management Center and
More informationLAB :: Secure SHell (SSL)
LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training
More informationSIRE Solution Suite. WebCenter User Manual. A Publication Of
SIRE Solution Suite An Official Manual of SIRE Technologies Document and Legislative Management Software Version 6.0 A Publication Of 2 2000-2011 SIRE Technologies Incorporated and its licensors. All rights
More informationBackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows
BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft
More informationCopyright 2017 Softerra, Ltd. All rights reserved
Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service
More informationUNIVERSITY OF CYPRUS Computer Science Department
UNIVERSITY OF CYPRUS Computer Science Department ΕΠΛ 660 Information Retrieval and Search Engines A guide for connecting to LInC 1 -powered cloud-based Virtual Machines Lab instructor: Pavlos Antoniou
More informationMoveIT DMZ User Guide
MoveIT DMZ User Guide December 10, 2014 1 Index MoveIT DMZ Introduction... 1 Initial Login and Password Change... 2 Navigation... 8 Installation Instructions for the Upload / Download Wizard... 12 Uploading
More informationYou can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.
CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection
More informationIntroduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault
Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data
More informationNoMachine NX Client Configuration Guide
NoMachine NX Client Configuration Guide Configuration steps for ssh key login Step 1: NoMachine NX requires keys in OpenSSH format, therefore the existing key needs to be converted into OpenSSH format.
More informationOutlook 2010 Setup Guide (POP3 Transmailaccess)
Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 7 /22/2013 Copyright 2012 Smarsh, Inc. All rights reserved. Purpose: This document will assist the end user in configuring Outlook 2010
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationFRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.
FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 III. Configuring the Outlook
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationConfiguring SSH Public Key Authentication
6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running
More informationAutomation Engine. Getting Started
Getting Started 05-2017 Contents 1. Installing Server and Clients... 4 2. Changing the Language used in the Pilot... 5 3. Starting or Updating the Pilot... 6 4. The Pilot's Main Window... 7 5. Concepts
More informationManaging Software Images Using Software Management
CHAPTER 8 Managing Software Images Using Software Management Manually upgrading your devices to the latest software version can be an error-prone, and time-consuming process. To ensure rapid, reliable
More informationRabbit Linux Masternode with Windows Cold Wallet
Rabbit Linux Masternode with Windows Cold Wallet This is the condensed version of the video showing how to install and set up a Linux VPS with Windows cold wallet setup for a Rabbit masternode. If you
More informationFRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.
FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 II. Determine your version of
More informationncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.
OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
More informationRelease notes for version 3.7.2
Release notes for version 3.7.2 Important! Create a backup copy of your projects before updating to the new version. Projects saved in the new version can t be opened in versions earlier than 3.7. Breaking
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager
Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside
More informationINSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook
INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars
More informationYou can use the private key.pem files to allow you to connect via SFTP on a server that only allows key access.
Products Services Portfolio Blog About Us Contact Us Support SFTP Tips & Tricks Using Keyfiles To Access SFTP Services You can use the private key.pem files to allow you to connect via SFTP on a server
More informationAspera Connect User Guide 3.7.0
Aspera Connect User Guide 3.7.0 Mac OS X Revision: 3.7.0.138343 Generated: 01/19/2017 13:37 Contents 2 Contents Introduction... 3 System Requirements... 4 Setting Up Connect...5 Part 1: Installation...5
More informationVPS SETUP: What is a VPS? A VPS is a cloud server, running on a virtual machine. You can t run a masternode on your computer itself.
Our guide makes it easy to set up your own masternode! BEFORE YOU BEGIN, YOU WILL NEED: 1. 1,000 SUPPO s 2. The latest SuppoCoin wallet, which can always be found here: https://www.suppocoin.io 3. Two
More informationSSH and keys. Network Startup Resource Center
SSH and keys Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationAsigra Cloud Backup v13.3 DS-Notebook Client User Guide. September 2017
Asigra Cloud Backup v13.3 DS-Notebook Client User Guide Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Asigra Inc. Asigra
More informationTable of Contents 1 SSH Configuration 1-1
Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server
More information2. This will bring you to a new window asking what type of policy you are inserting. Personal Policies. Commercial Policies. All Other Policies
How to Insert a New Client File To insert a new client file you can do this one of two ways. The first way is to manually insert the client file through Hawksoft. You would use this method if you are writing
More informationIn November 2018, the software for the Intranet version of Perinorm will be updated.
Release Notes for Perinorm Intranet November 2018 In November 2018, the software for the Intranet version of Perinorm will be updated. Some enhancements that will be implemented with the new software are
More informationReference Guide. Adding a Generic File Store - Importing From a Local or Network ShipWorks Page 1 of 21
Reference Guide Adding a Generic File Store - Importing From a Local or Network Folder Page 1 of 21 Adding a Generic File Store TABLE OF CONTENTS Background First Things First The Process Creating the
More informationUser Guide. Application Security for Workspace Environment Management - Preview V2/ September 2017
User Guide Application Security for Workspace Environment Management - Preview V2/ September 2017 Software version: 4.4.5 Release date: September 2017 Document revision: 2 Copyright 2017 Citrix Systems,
More informationFEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs
FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA
More informationPrincipia Archive Explorer
Principia Archive Explorer Welcome to the Principia Archive Explorer. This tool bundles together all the historical releases you need and makes it easier for you to install, download, and export the data
More informationTutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette
Secure SHell: Connect remotely anything, anywhere UL High Performance Computing (HPC) Team Sebastien Varrette University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 26 Summary 1 Introduction 2
More informationTAX REPORTING SUITE MODULE IDES VERSION 1712
TAX REPORTING SUITE MODULE IDES VERSION 1712 USERS S MANUAL Published: Jan 2018 For the latest information and to leave feedback, please visit Vogele IT-Services at http://www.section11.ch. 2 The information
More informationIBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide
IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export
More informationAsigra Cloud Backup v13.3 DS-Mobile Client User Guide. September 2017
Asigra Cloud Backup v13.3 DS-Mobile Client User Guide Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Asigra Inc. Asigra Inc.
More informationRecommended Maintenance Plan for Siriusware Clients for SQL server 2005
Recommended Maintenance Plan for Siriusware Clients for SQL server 2005 PURPOSE The purpose of this document is to describe how to automate the periodic rebuilding of indexes for the SiriusSQL database.
More informationHMIS APR v5.1 CSV Export for Sage
HMIS APR v5.1 CSV Export for Sage The HMIS APR v5.1 CSV Export is designed to meet HUD reporting requirements with the SAGE Repository. It is an export consisting of 65 separate CSV files. Similar to other
More informationINSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017
INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University Updated May 19, 2017 The first thing you will need is SSH. SSH
More informationQuick Start. How to start monitoring use of your computer right away.
Quick Start Using the Scheduler Capture Types Other Recommended Settings Viewing Captured Information Viewing, Replaying and Deleting captures Silently Emailing Capture Logs Hiding the prog. from praying
More informationUsing keys with SSH Rob Judd
Using keys with SSH Rob Judd (rjudd@mlug.missouri.edu) Introduction SSH is a drop-in replacement for telnet that allows encrypted network connections. There are two main versions, 1.5 SSH-1 and 2.0 SSH-2
More informationUpgrading Workstations To Maximizer CRM Summer 2013
This document provides guidance for the update of individual workstation computers to Maximizer CRM Summer 2013 edition. This guide is into sections: 1. update of Maximizer Windows desktop software (and
More informationPC Agent Quick Start. Opening the Agent. Logging in to the Agent. Connected Backup. Version 8.6. Revision 0
T E C H N I C A L N O T E Version 8.6 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on your computer, contact your
More informationElectronic Processes Day 5 Exit Files and Web Exits
Electronic Processes Day 5 Exit Files and Web Exits Goals for today s training What is an Exit File How to create an Exit File How to transfer an Exit File What happens when an Exit File is received at
More informationNote, you must have Java installed on your computer in order to use Exactly. Download Java here: Installing Exactly
Exactly: User Guide Exactly is used to safely transfer your files in strict accordance with digital preservation best practices. Before you get started with Exactly, have you discussed with the archive
More informationLinux Network Administration
Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH
More informationTitan FTP Server SSH Host Key Authentication with SFTP
2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River
More informationIntegrate with HeroPM
Integrate with HeroPM What is Hero PM and PROMAS Central? HeroPM is the new name for what used to be called PROMAS Central. It consists of the Internet Publishing screen within the PROMAS application and
More informationMcAfee File and Removable Media Protection Product Guide
McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More information9.4 Authentication Server
9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the
More informationTable of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1
Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle
More informationINSTALLATION AND REGISTRATION MANUAL
INSTALLATION AND REGISTRATION MANUAL www.abraxasenergy.com Installing Metrix 4.4 1. IMPORTANT: Before any software installation, make back up copies of your work! Abraxas Energy assumes no responsibility
More informationSecret Server Demo Outline
Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during
More informationDeposit Wizard TellerScan Installation Guide
Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3
More informationUpgrading the Server Software
APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining
More informationCreate MedicCoin Master Node Instruction Rev2
Create MedicCoin Master Node Instruction Rev2 1. Download MedicCoin wallet using below link https://mediccoin.com/mediccoin-window.zip 2. Unzip/extract MedicCoin-Window.zip to C:\coins\MedicCoin folder.
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationQuestion: How do I move my mobile account from the Corporate to my Personal Account?
Question: How do I move my mobile account from the Corporate to my Personal Account? Answer: A user leaving Nortel can move his/her account off of the corporate program and into a personal liable account.
More informationAGENT123. Full Q&A and Tutorials Table of Contents. Website IDX Agent Gallery Step-by-Step Tutorials
AGENT123 Full Q&A and Tutorials Table of Contents Website IDX Agent Gallery Step-by-Step Tutorials WEBSITE General 1. How do I log into my website? 2. How do I change the Meta Tags on my website? 3. How
More informationNotifyMDM Device Application User Guide Installation and Configuration for Android
NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions
More informationExporting distribution lists from Thunderbird to Outlook
Exporting distribution lists from Thunderbird to Outlook PLEASE NOTE: Do not export the lists under Distribution Lists in your Thunderbird Address Book as these will no longer be maintained on the new
More informationAdmin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal
Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles
More information