1 | | = SSH Usage = |
2 | | == SSH Usage == |
| 1 | = Terminals and Shells = |
| 2 | |
| 3 | The terminal has been the primary means of interfacing with a cluster computing machine since the 1960s. Today, users who are working on a laptop or desktop with an operating system that is based on Unix will have a useful terminal built into their operating system. This includes anyone using Mac os X or any flavor of Linux. To access the terminal program on a Mac go to |
| 4 | |
| 5 | ''Applications -> Utilities -> Terminal'' |
| 6 | |
| 7 | This will launch a terminal containing a unix shell. The unix shell is a command line interpreter which both allows you to pass commands to the operating system and displays output. Currently, the default shell for most unix based systems is the Bourne Again SHell or bash shell. Your shell can be modified to provide a custom environment and we will go into detail on how to make these modifications in later sessions. |
| 8 | |
| 9 | = Remote Access = |
| 10 | |
| 11 | Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet. Subsequently (1983), the Berkley Software Distribution Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide. |
| 12 | |
| 13 | |
| 14 | == Secure SHell (SSH) == |