Changes between Version 2 and Version 3 of cypress/SshUsage
- Timestamp:
- 08/18/15 12:13:42 (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
cypress/SshUsage
v2 v3 1 1 = Terminals and Shells = 2 2 3 The terminal has been the primary means of interfacing with a cluster computing machine since the 1960s. Today, users who are working on a laptop or desktop with an operating system that is based on Unix will have a useful terminal built into their operating system. This includes anyone using Mac os X or any flavor of Linux. To access the terminal program on a Mac go to 3 [[Image(univac_1965_2.jpg, center)]] 4 ''Taken from UNIVAC promotional materials circa 1960'' 5 6 The terminal has been the primary means of interfacing with a cluster computing machine since the 1960s. Today, users who are working on a laptop or desktop with an operating system that is based on Unix will have a useful terminal built into their operating system. This includes anyone using Mac os X or any flavor of Linux. 7 8 == Mac Terminal == 9 10 To access the terminal program on a Mac go to 4 11 5 12 ''Applications -> Utilities -> Terminal'' 6 13 14 [[Image(utilities_terminal.png, center)]] 15 7 16 This will launch a terminal containing a unix shell. The unix shell is a command line interpreter which both allows you to pass commands to the operating system and displays output. Currently, the default shell for most unix based systems is the Bourne Again SHell or bash shell. Your shell can be modified to provide a custom environment and we will go into detail on how to make these modifications in later sessions. 17 18 [[Image(terminal.png, center)]] 19 20 == Ubuntu Terminal == 21 22 In Unity versions of Ubuntu (11.04 and later) the easiest way to access the terminal is through the search function of the dash 23 24 ''Dash -> Search for Terminal'' 25 26 == Windows "Terminal" == 27 As Windows is NOT a Unix based OS, it lacks a native terminal emulator that is capable of provide a Unix shell. This will require a work around. For our requirements, the most common solution is the installation of an open source terminal emulator called PuTTY that supports the communication protocols discussed below. If you are using a Windows machine and you have not already downloaded PuTTY you should do so now. 28 29 [[http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html|Download Putty]] 30 31 [[http://the.earth.li/~sgtatham/putty/0.62/htmldoc/|Putty Manual]] 8 32 9 33 = Remote Access = 10 34 11 35 Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet. Subsequently (1983), the Berkley Software Distribution Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide. 36 12 37 13 38