Changes between Version 3 and Version 4 of cypress/SshUsage
- Timestamp:
- 08/18/15 15:33:37 (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
cypress/SshUsage
v3 v4 24 24 ''Dash -> Search for Terminal'' 25 25 26 [[Image(ubuntu_terminal.png,center)]] 27 28 [[Image(terminal2.png, center)]] 29 26 30 == Windows "Terminal" == 27 31 As Windows is NOT a Unix based OS, it lacks a native terminal emulator that is capable of provide a Unix shell. This will require a work around. For our requirements, the most common solution is the installation of an open source terminal emulator called PuTTY that supports the communication protocols discussed below. If you are using a Windows machine and you have not already downloaded PuTTY you should do so now. … … 31 35 [[http://the.earth.li/~sgtatham/putty/0.62/htmldoc/|Putty Manual]] 32 36 37 After you've downloaded the PuTTY.exe file, move it to the location you prefer and double click to launch. 38 39 [[Image(PuTTY_launch.png, center)]] 40 41 To log onto cypress, enter cypress1.tulane.edu (or cypress2.tulane.edu) into the Host Name field and make sure the port is set to 22. Click on Open and you will be given a login window to cypress. 42 43 [[Image(PuTTY.png, center)]] 33 44 = Remote Access = 34 45 35 Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet. Subsequently (1983), the Berkley Software Distribution Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide. 46 == A short History == 47 Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a Complex Number Machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet which are still in use today. Subsequently (1983), the Berkley Software Distribution (BSD) Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide. 36 48 37 49 … … 44 56 {{{user@localhost> ssh remoteusername@remotehost.example.com}}} 45 57 46 You should be prompted for the password associated with your remote username. For those who have accounts on Cypress, you can connect to cypress by running the command58 The first time you log onto a new machine, you will be asked if you trust the server. You should be prompted for the password associated with your remote username. For those who have accounts on Cypress, you can connect to cypress by running the command 47 59 48 60 {{{user@localhost> ssh tulaneID@cypress1.tulane.edu}}}