Experimental Techniques 8
|
|
- Ashley Junior Nichols
- 8 years ago
- Views:
Transcription
1 Experimental Techniques 8 Remotely Logging into a Linux Workstation JinJie Jiang, Ph.D, Ralph T. Weber, Ph.D. Bruker BioSpin Corporation EPR Division 19 Fortune Drive Billerica, MA USA 1. Introduction The Linux workstation delivered with your Elexsys EPR spectrometer offers you several options to login remotely or transfer files. The most commonly-used tools have been Telnet or rlogin for remote login and FTP or rcp for data transfer. Computer experts discourage the use of these tools because they do not offer the security required to protect your system and information from mischief. For this reason, many versions of Red Hat Linux disable FTP and Telnet by default. We encourage using alternative tools such as SSH (Secure SHell) and SFTP (Secure FTP) that give you similar functionality with added security. This note describes SSH and SFTP from either a Linux or MS Windows platform. It also describes how to activate and heighten the security of your Linux workstation should you still choose to use FTP and Telnet. 2. SSH, A Secured Way to Telnet 2.1. What is SSH? SSH (Secure SHell) is an internet protocol that allows a user to connect to a remote host via an encrypted link by: 1) an authentication process with a special key, and 2) encrypting information including passwords that may be intercepted by hackers. To use SSH you need: 1) an sshd daemon running on the server; 2) an SSH program on the client computer; 3) a user s account and password on the server. To check whether sshd is running on the server you can use the ps -ax grep sshd command on the server. If not, start the daemon by typing /usr/sbin/sshd (n.b. you must be root to use this command). The Red Hat Linux operating system provides an SSH program for both the server and client. For the SGI O2 IRIX operating system and MS Windows operating system, there are free and commercial SSH or SSH-like software available for client and server computers. Special regulations may apply to encryption software depending on your country. Make sure you do not violate these regulations. Experimental Techniques 8
2 SSH, A Secured Way to Telnet 2.2. SSH from a Linux workstation 2.3. SSH from MS Windows It is easy to use SSH to connect a computer with Red Hat Linux to a Red Hat Linux workstation since the sshd daemon is running by default. Simply open a shell window and type ssh <server s IP address> under the prompt sign. You can also use the server s hostname if it is listed in the client computer s /etc/hosts file or DNS (Domain Name Server) is available. You will be prompted for user account and password. The first time you try to connect to the remote host you will be asked whether the host is a trusted host. If your answer is Yes, a so-called magic key (authentication) will be generated for you and then you can proceed just as you would with Telnet. If you activated remote display by the command xhost + <host IP address> before you launch SSH, you can launch the Xepr program after you log in remotely. A Microsoft Windows operating system does not provide SSH support. You need to install an SSH program. Several web sites provide SSH software either for free or commercially. You can find them at: A particularly useful web site is It provides a free MS Windows -based client program called PuTTY that offers SSH connections. Read the instructions and manuals posted on the above web site before you install. 2
3 SSH, A Secured Way to Telnet Enter hostname or IP address Select SSH Name the session Figure 2-1 Configuring and launching PuTTY (SSH) from a MS Windows -based computer. Double click the putty.exe icon to launch the program. A configuration dialog window opens. (See Figure 2-1.) Enter the IP address or hostname of the SSH server, e.g. the Linux workstation. Select SSH as the protocol. You can give a session name and Save it so that you can Load it the next time. Click the Open button to start the connection. A DOS window opens prompting for a login account and password. Enter the user account name and password and you will be connected to the host. The first time you establish the connection you need to answer yes to the question of whether the remote host is a trusted host. Figure 2-2 Login to a remote host using the SSH program. Experimental Techniques 8 3
4 SFTP, A Secure Way to FTP 3. SFTP, A Secure Way to FTP 3.1. What is SFTP? Similar to SSH, SFTP (Secure FTP) is a secure means to transfer files. It utilizes SSH s authentication feature and encrypts the transactions SFTP from a Linux System To SFTP between computers with Linux operating systems you can simply enter sftp <IP address (or hostname)> in a shell window. The authentication and login process are the same as SSH SFTP from a MS Windows System You can find SFTP freeware for MS Windows -based systems from the web site: Among these programs ixplore is particular convenient and easy to use since it has a graphical user interface. Download and install this software package onto your MS Window -based PC following the instructions on its web site. Launch the ixplore program. In the opened window, right-mouse-click SSH Hosts > New SSH Host. (See Figure 3-3.) Figure 3-3 Setting up a New SSH Host. 4
5 SFTP, A Secure Way to FTP A pop-up window of the Remote SSH Host Properties opens. In the Remote SSH Host Properties window enter the Host Display Name, Host (IP address or complete hostname), Username, and other optional information. Click OK. Figure 3-4 Entering Remote SSH Host Properties. Experimental Techniques 8 5
6 SFTP, A Secure Way to FTP You need to confirm that the remote host is a trusted host as part of the authentication process. You will not be able to type in the text box. Click the Yes button instead. You may need to scroll down to see the Yes button. Figure 3-5 Confirming the remote host. If your New SSH Host was configured properly you will be prompted for the password. Enter the password and click OK. Figure 3-6 Entering the password. 6
7 SFTP, A Secure Way to FTP Now you are logged in. From the window you can upload or download files or folders. The nice thing about this program is that you can drag and drop. Local site Remote site Figure 3-7 SFTP window After you finish the transaction you can log out by right clicking the remote host icon and then clicking Log Off. (See Figure 3-8.) Figure 3-8 Logout from the remote host. If you save this session you will find the icon in the SSH Hosts list. You can can click the icon and then Open to start an SFTP session or click Properties to modify the configurations. You can reestablish a connection to an SSH Experimental Techniques 8 7
8 What If I Still Want to Use Telnet or FTP? host, simply by clicking its icon to start an SFTP session. A right mouse click allows you to modify the settings. 4. What If I Still Want to Use Telnet or FTP? 4.1. How to activate Telnet and FTP 4.2. Make it a little safer It is not recommended that you increase the security by editing the hosts.allow and hosts.deny files since that might cause booting problem of the acquisition server. By default, Red Hat Linux (7.1 or above) disables Telnet and FTP. You can activate them in a server by modifying their configuration files. You need to be root to edit these files. Use a text editor to open the /etc/xinetd.d/telnet file. Find the entry disable = yes and change it to disable = no. Save the modified file. Edit the /etc/xinetd.d/wu-ftp file the same way. In a shell window enter service network restart. The new settings will then be active. You will be able to remotely login with Telnet or FTP. You can limit the Telnet and FTP services to trusted hosts only if you know their IP addresses. In the /etc/xinetd.d/telnet file add a line: only_from = <IP address(es)>. You can separate the IP addresses by a coma if there is more than one IP address. You can also enter a subnet address to allow all the hosts from this subnet to access the service. The format is <subnet address>/<number of bits for network and subnet>. For example, if you add only_from = /24, all 254 hosts in the subnet can access your Telnet service. The number 24 indicates that 24 bits of the 32 bit IP address are used for the network/subnet address. If you change to only_from = /28 it means that the first 28 bits of the total 32 bits are used for network/subnet address. All 14 hosts from to of the subnet are allowed to login remotely with Telnet. Ask your local network administrator for the subnet address and network mask if you plan to allow all your local subnet users to use Telnet. You can set the same restriction on FTP via the /etc/xinitd.d/wu-ftp file. 8
9 Glossary 5. Glossary rcp rlogin rsh ssh sshd ssh-agent ssh-add sftp scp ssh-keygen sftp-server ssh-keyscan Remote CoPy. Remote LOGIN. Remote SHell. Secure SHell, a basic rlogin/rsh-like client program. The ssh daemon that permits you to login. An authentication agent that can store private keys. Tool which adds keys to the above agent. FTP-like program that works over SSH1 and SSH2 protocols. Secure CoPy, a file copy program that acts like rcp. Key generation tool. SFTP server subsystem (started automatically by sshd in a Linux system). Utility for gathering public host keys from a number of hosts. Experimental Techniques 8 9
10 Notes 10
Installing the SSH Client v3.2.2 For Microsoft Windows
WIN1011 June 2003 Installing the SSH Client v3.2.2 For Microsoft Windows OVERVIEW... 1 SYSTEM REQUIREMENTS... 2 INSTALLING THE SSH PACKAGE... 2 STARTING THE PROGRAMS... 5 USING THE SHELL CLIENT... 8 USING
More informationIntroductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols
Cardiff University Cardiff School of Computer Science Prifysgol Caerdydd Ysgol Cyfrifiadureg Caerdydd Introductory Note 711 & 811 Remote Access to Computer Science Linux Files Using Secure Shell Protocols
More informationAnzioWin FTP Dialog. AnzioWin version 15.0 and later
AnzioWin FTP Dialog AnzioWin version 15.0 and later With AnzioWin version 15.0, we have included an enhanced interactive FTP dialog that operates similar to Windows Explorer. The FTP dialog, shown below,
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationAccess Instructions for United Stationers ECDB (ecommerce Database) 2.0
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...
More informationConnecting to the School of Computing Servers and Transferring Files
Connecting to the School of Computing Servers and Transferring Files Connecting This document will provide instructions on how to connect to the School of Computing s server. Connect Using a Mac or Linux
More information[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures
More informationMiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
More informationHow to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
More informationInstalling Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.
Reference : USER184 Issue date : December 2002 Revision date : September 2007 Classification : Software Originator : Hugh Burt REVISED DOCUMENT Installing Microsoft Outlook on a Macintosh This document
More informationUploading files to a web server using SSH Secure Shell 3.2.9
Uploading files to a web server using SSH Secure Shell 3.2.9 Practical workbook Aims and Learning Objectives By the end of this course you will be able to: Upload your documents (for example HTML files)
More informationSSH! Keep it secret. Keep it safe
SSH! Keep it secret. Keep it safe Using Secure Shell to Help Manage Multiple Servers Don Prezioso Ashland University Why use SSH? Proliferation of servers Physical servers now Virtual / Hosted System management
More informationSecure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
More informationLab 8: Configuring Backups
CompTIA Security+ Lab Series Lab 8: Configuring Backups CompTIA Security+ Domain 2 - Compliance and Operational Security Objective 2.7: Execute disaster recovery plans and procedures Document Version:
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationMiami University RedHawk Cluster Connecting to the Cluster Using Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.
More informationGuide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC The ITC has tested several SFTP client programs for submitting digital data to the ITC. These include
More informationInstall FileZilla Client. Connecting to an FTP server
Install FileZilla Client Secure FTP is Middle Georgia State College s supported sftp client for accessing your Web folder on Webdav howeve you may use FileZilla or other FTP clients so long as they support
More informationInstall and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
More information2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
More informationExport & Backup Guide
Eport & Backup Guide Welcome to the WebOffice and WorkSpace eport and backup guide. This guide provides an overview and requirements of the tools available to etract data from your WebOffice or WorkSpace
More informationQuick Start Guide. Hosting Your Domain
Quick Start Guide Hosting Your Domain http://www.names.co.uk/support/ Table of Contents Web Hosting... 3 FTP (File Transfer Protocol)... 3 File Manager... 6 SiteMaker... 7 2 Please keep these documents
More informationGuide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI The Quality Assurance Review Center has tested several SFTP client programs for submitting digital
More informationOpenVPN over SSH tunneling
Step 1: What you'll need before starting OpenVPN over SSH tunneling You're going to need a couple of things in order to create an SSH tunnel that you can use as a SOCKS 5 proxy for tunneling OpenVPN or
More informationSysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
More informationUser Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date
User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date: July 22, 2015 TABLE OF CONTENTS Page TRUST SAFETY ACCOUNTING UPLOAD USER GUIDE... 2 BACKGROUND... 2 HOW TO USE THE
More informationUW Computer Science and Engineering Starting UNIX X Clients From Windows XP. revised September 2008 - Warren Jessop
UW Computer Science and Engineering Starting UNIX X Clients From Windows XP revised September 2008 - Warren Jessop X Clients on Windows PCs 1 Prerequisites You ll need a PC running XP or Vista. The Goal
More informationOverview. Remote access and file transfer. SSH clients by platform. Logging in remotely
Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files
More informationHow to Bypass Your Corporate Firewall Using SSH Tunneling
How to Bypass Your Corporate Firewall Using SSH Tunneling ~pingywon 2004 Preface: I had gotten a new job and no way to connect back to my house (Terminal service, Radmin, VNC what ever) due to our firewall
More informationFTP Server Application Guide. Rev: 2.0.0 1910010855
FTP Server Application Guide Rev: 2.0.0 1910010855 Contents Overview... 1 How to access FTP Server... 2 LAN Access... 2 WAN Access... 7 Extended Application... 12 How to create a user account... 12 How
More informationSecure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
More informationUsing SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.
Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...
More informationSSH and Basic Commands
SSH and Basic Commands In this tutorial we'll introduce you to SSH - a tool that allows you to send remote commands to your Web server - and show you some simple UNIX commands to help you manage your website.
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationMATLAB on EC2 Instructions Guide
MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.
More informationFTP Server Application Guide
FTP Server Application Guide TD-W8968 TD-W8970 / TD-W8970B TD-W8980 / TD-W8980B Rev: 1.0.1 1910010771 Contents Overview... 1 How to access FTP Server... 2 LAN Access... 2 WAN Access... 7 Extended Application...
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationNAS 109 Using NAS with Linux
NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on
More informationSFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org
SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.
More informationPlease note that a username and password will be made available upon request. These are necessary to transfer files.
Transferring Data Using Secure File Transfer Process ASU Center for Health Information and Research (CHiR) data partners can now securely electronically send their data submissions by means of Secure File
More informationHow to install and set up the WinSCP software for Secure File Transfer
How to install and set up the WinSCP software for Secure File Transfer WinSCP FTP client is free and easy to use. If you have another secure FTP client you may use it and simply configure it to match the
More informationIf you have questions or find errors in the guide, please, contact us under the following e-mail address:
1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration
More informationSafety and Health Grant Program Database Remote Access Installation Guide
Safety and Health Grant Program Database Remote Access Installation Guide Version 1.01 October 29, 2011 Imagine Nation Software 8223 Yukon Hills Ct. Las Vegas, NV 89178 www.insoftware.net Contact: Michael
More informationFile Transfer with Secure FTP
File Transfer with Secure FTP The Princeton Review values the security of all client s information and would like to encourage all FTP file transfers to and from our clients be conducted utilizing a Secure
More informationConfiguring for SFTP March 2013
Configuring for SFTP March 2013 Overview You can upload files to and download files from Optimal Payments securely via SFTP. In order to be configured to upload and download files via SFTP, contact Technical
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationTS-800. Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.
TS-800 Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.4 dsas Table of Contents Overview... 1 Configuring OpenSSH Software
More informationConnecting to the Hospira FTP Server
Connecting to Hospira s FTP Server To transfer files to and from Hospira s FTP Server requires a connection to ftp.hospira-transfer.com. Several commercial and shareware File Transfer Protocol (FTP) software
More informationManaging the System Event Log
This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers in a Chassis, page 2 Configuring
More informationGetting Started With Your Virtual Dedicated Server. Getting Started Guide
Getting Started Guide Getting Started With Your Virtual Dedicated Server Setting up and hosting a domain on your Linux Virtual Dedicated Server using cpanel. Getting Started with Your Virtual Dedicated
More informationUser Guide Microsoft Exchange Remote Test Instructions
User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating
More informationSecuring Windows Remote Desktop with CopSSH
Securing Windows Remote Desktop with CopSSH Presented by DrNathan@teamhackaday.com If you enjoyed this article, please consider joining our Folding@Home team I like having the ability to remotely access
More informationUsing the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu
Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu Topics: 1. Logging on to the server space 2. How to create a new folder on the server
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationAccessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
More informationMapping the ITS File Server Folders to Mosaic Windows
Mapping the ITS File Server Folders to Mosaic Windows January 31 2012 The following instructions are to show you how to map your shared and Home drive using ITS s Network. Contents Home Folder (Drive V:)...
More informationXopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
More informationLab 8.3.3b Configuring a Remote Router Using SSH
Lab 8.3.3b Configuring a Remote Router Using SSH Objectives Use SDM to configure a router to accept SSH connections. Configure SSH client software on a PC. Establish a connection to a Cisco ISR using SSH
More informationInstructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas
ACF Supercomputer Access Instructions 1 Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas ACF Supercomputer Access Instructions 2 Contents Instructions
More informationLaboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
More informationStarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core
StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.
More informationUser Guide Version 3.0
User Guide Version 3.0 Page 2 of 12 Summary Contents 1 INTRODUCTION 3 1.1 WHAT IS FTP? 3 1.2 FTP REQUIRED INFO 3 2 FTP MANAGER 4 2.1 CREATING USERS IN FTP MANAGER 5 2.1.1 Creating a Username in FTP Manager
More informationCASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationwww.nuvox.net, enter the administrator user name and password for that domain.
Page 1 of 7 Cute_FTP Server Names and Authentication Before connecting to an FTP site you need three pieces of information: the server name or the site you are connecting to and a user name and password.
More informationConnectivity using ssh, rsync & vsftpd
Connectivity using ssh, rsync & vsftpd A Presentation for the 2005 Linux Server Boot Camp by David Brown David has 15 years of systems development experience with EDS, and has been writing Linux based
More informationHPCC - Hrothgar Getting Started User Guide
HPCC - Hrothgar Getting Started User Guide Transfer files High Performance Computing Center Texas Tech University HPCC - Hrothgar 2 Table of Contents Transferring files... 3 1.1 Transferring files using
More informationRemote Access: Citrix Client Setup
Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop
More informationilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
More informationSecuring Windows Remote Desktop with CopSSH
Securing Windows Remote Desktop with CopSSH Presented by DrNathan@teamhackaday.com If you enjoyed this article, please consider joining our Folding@Home team I like having the ability to remotely access
More informationGUIDANCE ON ACCESSING THE HOUSTON METRO SECURE FTP SITE FOR DOCUMENT MANAGEMENT
GUIDANCE ON ACCESSING THE HOUSTON METRO SECURE FTP SITE FOR DOCUMENT MANAGEMENT Documents associated with the 5310 grant program will be stored and retrieved using Houston METRO's Secure FTP (FTP) site.
More informationParallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server
Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version
More informationUpgrade your Software
Video server software From time to time software upgrades are issued for the video servers. These are posted on our website www.ad-networkvideo.com or on the product CD and consist of two parts, the application
More informationLab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
More informationAccess your directories (home directory and shared directories) outside Tilburg University
Access your directories (home directory and shared directories) outside Tilburg University FileZilla offers you the possibility to access your personal M-drive or other network locations through a secure
More informationFTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"
FTP Over SSL (FTPS) Gordon State College has setup FTP Over SSL (also known as FTPS ) to allow students, faculty, and staff to access resources from our Servers from off-campus using an encrypted connection.
More informationEventTracker Windows syslog User Guide
EventTracker Windows syslog User Guide Publication Date: September 16, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document is prepared to help user(s)
More informationInstalling the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
More informationInstallation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1
Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1 About Fiery Extended Applications Fiery Extended Applications (FEA) 4.1 is a package of the following applications for use
More informationMoxa Device Manager 2.0 User s Guide
First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual
More informationManaging the System Event Log
Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers
More informationHyper-V Server 2008 Setup and Configuration Tool Guide
Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationHost your websites. The process to host a single website is different from having multiple sites.
The following guide will help you to setup the hosts, in case you want to run multiple websites on your VPS. This is similar to setting up a shared server that hosts multiple websites, using a single shared
More informationUsing WinSCP to Transfer Data with Florida SHOTS
Using WinSCP to Transfer Data with Florida SHOTS Purpose: This document contains instructions for downloading, installing and using WinSCP, a free software download that enables the basic transfer of data
More informationReadyNAS Remote Troubleshooting Guide NETGEAR
ReadyNAS Remote Troubleshooting Guide NETGEAR June 2010 Symptom: I cannot see any shares from my PC This symptom can be caused by a variety of reasons. To diagnose the problem, please make sure your are
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationHallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationCreating a Website with MS Publisher
Creating a Website with MS Publisher Getting Started with the Wizard...1 Editing the Home Page...3 Editing Text...3 Editing and Inserting Graphics...4 Inserting Pictures...6 Inserting a Table...6 Inserting
More informationPTC X/Server. Evaluation Guide. PTC Inc.
PTC X/Server Evaluation Guide PTC Inc. PTC X/Server: Evaluation Guide Copyright 2014 PTC Inc. and/or Its Subsidiary Companies. All Rights Reserved. User and training guides and related documentation from
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationGlobal TAC Secure FTP Site Customer User Guide
Global TAC Secure FTP Site Customer User Guide Introduction This guide is provided to assist you in using the GTAC Secure FTP site. This site resides in the Houston Remote Services Center (RSC), and is
More informationUsing the Secure District File Retrieval System to Access 2008 AYP Accountability Reports
Using the Secure District File Retrieval System to Access 2008 AYP Accountability Reports Office of Research and Statistics Mississippi Department of Education Revised October 6, 2008 Traditionally, the
More informationBackup & Restore Guide
The email Integrity Company Sendio Email Security Platform Appliance Backup & Restore Guide Sendio, Inc. 4911 Birch St. Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com 2010 Sendio,
More informationFundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
More informationWinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
More information