Changes between Version 3 and Version 4 of cypress/SshUsage


Ignore:
Timestamp:
Aug 18, 2015 3:33:37 PM (6 years ago)
Author:
cmaggio
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • cypress/SshUsage

    v3 v4  
    2424''Dash -> Search for Terminal''
    2525
     26[[Image(ubuntu_terminal.png,center)]]
     27
     28[[Image(terminal2.png, center)]]
     29
    2630== Windows "Terminal" ==
    2731As Windows is NOT a Unix based OS, it lacks a native terminal emulator that is capable of provide a Unix shell. This will require a work around. For our requirements, the most common solution is the installation of an open source terminal emulator called PuTTY that supports the communication protocols discussed below. If you are using a Windows machine and you have not already downloaded PuTTY you should do so now.
     
    3135[[http://the.earth.li/~sgtatham/putty/0.62/htmldoc/|Putty Manual]]
    3236
     37After you've downloaded the PuTTY.exe file, move it to the location you prefer and double click to launch.
     38
     39[[Image(PuTTY_launch.png, center)]]
     40
     41To log onto cypress, enter cypress1.tulane.edu (or cypress2.tulane.edu) into the Host Name field and make sure the port is set to 22. Click on Open and you will be given a login window to cypress.
     42
     43[[Image(PuTTY.png, center)]]
    3344= Remote Access =
    3445
    35 Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet. Subsequently (1983), the Berkley Software Distribution Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide.
     46== A short History ==
     47Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a Complex Number Machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet which are still in use today. Subsequently (1983), the Berkley Software Distribution (BSD) Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide.
    3648
    3749
     
    4456{{{user@localhost> ssh remoteusername@remotehost.example.com}}}
    4557
    46 You should be prompted for the password associated with your remote username. For those who have accounts on Cypress, you can connect to cypress by running the command
     58The first time you log onto a new machine, you will be asked if you trust the server. You should be prompted for the password associated with your remote username. For those who have accounts on Cypress, you can connect to cypress by running the command
    4759
    4860{{{user@localhost> ssh tulaneID@cypress1.tulane.edu}}}