Changes between Version 43 and Version 44 of cypress/SshUsage
- Timestamp:
- 02/26/21 15:40:07 (4 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
cypress/SshUsage
v43 v44 40 40 || [[Image(WindowsSearchBox.png, center, 50%)]]||[[Image(WindowsCommandPrompt.png, center, 50%)]] || 41 41 42 Check that sshis installed by entering the following command.42 Check that '''ssh''' is installed by entering the following command. 43 43 44 44 {{{ … … 151 151 152 152 == A short History == 153 Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a Complex Number Machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet which are still in use today. Subsequently (1983), the Berkley Software Distribution (BSD) Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or ssh, and this has become the default means of remote access for unix based machines world wide.153 Scientists have been performing computations remotely since 1940 when George Stibitz used a Teletype machine to perform remote computations on a Complex Number Machine in New York City from the an AMS conference held at Dartmouth (http://history-computer.com/Internet/Dreamers/Stibitz.html). By 1973, standards were defined for a set of remote access protocols called Telnet which are still in use today. Subsequently (1983), the Berkley Software Distribution (BSD) Unix operating system instituted an alternative protocol called Remote SHell, or rsh. While still available on most systems, rsh is not recommended for common use as it lacks encryption. In 1995, this lack of security lead a researcher named Tatu Ylonen to invent a secure set of protocols after his University was the victim of a sniffing attack. He named his protocols Secure SHell, or SSH, and this has become the default means of remote access for unix based machines world wide. 154 154 155 155 156 156 157 157 == Secure SHell (SSH) == 158 === Linux and Mac===159 Users on Mac and Linux workstations have ssh available on the command line. 158 === Linux, Mac, Windows 10, and WSL === 159 Originally, only users on Mac and Linux workstations had '''ssh''' available on the command line. Afterwards, support for '''ssh''' was added to Windows 10 - initially via WSL (see [#InstallingWindowsSubsystemforLinuxWSL WSL] above) and then directly from the Windows terminal. 160 160 To connect to a remote server run the following: 161 161 … … 182 182 [[Image(https://docs.google.com/drawings/d/e/2PACX-1vSlffILDUxxzh_QpD4M7P5-bY_tCkYNjA9xIYWuUUqz_HBBczQ18o5AWA9OZ5_w5Q0bwQJbdgmUCuMJ/pub?w=594&h=209, center)]] 183 183 184 == Tunneling X Windows Session via SSH == 185 === Linux and Mac === 186 Users on Mac and Linux workstations have ssh available on the command line. 184 == Tunneling X Windows Session == 185 186 === Using SSH === 187 188 The '''ssh''' command has a '''-Y''' option to support X window tunneling. 187 189 188 190 To connect to a remote server with X window tunneling run the following: … … 192 194 }}} 193 195 196 ==== Mac ==== 197 194 198 For Mac users, you may have to install [https://www.xquartz.org/ XQuartz]. 199 195 200 === Windows === 196 Windows users will need to download an X window server/client software. 201 202 All Windows users - whether using '''ssh''' or PuTTY - will need to download and install X window server/client software. 197 203 198 204 [[https://sourceforge.net/projects/xming/files/Xming/|Xming]] … … 202 208 [[http://www.cygwin.com/|Cygwin]] 203 209 210 ==== Using PuTTY ==== 211 204 212 [[Image(puttyX11.png, center, 30%)]] 205 With PuTTY , enable X11 forwarding.213 With PuTTY - in addition to X window server/client software mentioned above, enable X11 forwarding as shown. 206 214 207 215 = CHECKPOINT =