Tutorial Guide to the IS Unix Service

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Tutorial Guide to the IS Unix Service"

Transcription

1 Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular to the general purpose Unix server granby. The information in this Guide is also helpful if you are using other Unix/Linux servers.

2 Contents 1. Servers Username and password Software for connecting to Unix/Linux hosts Text-based (command line) interface via SSH...2 Multiple sessions Text-based (command line) interface via SSH with Exceed running in background Windows style desktop on granby...5 Points to note about using the desktop...7 Basic features of the KDE desktop File permissions a brief description Selecting groups of files by pattern matching Transferring files between the server and a PC Help information...10

3 1. Servers Information Services provides a Unix server known as granby for general type of work, a Linux (64 bit) server known as caunton for running specialized applications requiring intensive computing power, and also some Unix workstations in various locations. The term Unix Service in this Guide refers to all of these collectively. IS also provides access to a High Performance Computing (HPC) facility using Linux servers. This Guide refers mainly to granby, but much of the information in it is also applicable to the other servers mentioned above. You can check the availability of software on the Unix service and the HPC from the applications web page on the IS website at the link: 2. Username and password Before you can use granby, your username must be created on the Unix service. Students can register to use the Unix service from a PC in an IS Computer Room by re-entering the registration software and requesting the creation of a username on the Unix service. Members of staff should contact their School IT Representative. Having obtained a username and password for the Unix service you may use that username and password to access granby, caunton and the IS Unix workstations. After logging in for the first time, using the supplied default password, you must change your password as soon as possible to something known only to you. The change of password will be actioned on the all Unix servers and workstations mentioned above. Note that the Unix command to change your password is: passwd. Please bear in mind that Unix/Linux servers are case sensitive. Your username must be typed in lower case, and each letter of your password must be typed in the correct case in which it was set. 3. Software for connecting to Unix/Linux hosts On PCs in IS Computer Rooms, software for connecting to remote hosts is provided in the NAL folder called Accessing the Internet. If you are using another PC, such as a research group or individual staff PC in a School, you should install this software locally on the PC. For information on how to obtain the installation material, please consult the entries on SSH and Exceed on the Applications web page whose link has been given above. Exceed may be installed from the NAL folder entitled Software Installation or from a CD available from the IT Service Point, while SSH can be downloaded can the website When you run this software, it creates an interface on the PC through which you can communicate with the remote servers. Three types of interfaces are available: Tutorial Guide to the IS Unix Service 1

4 A text-based interface via SSH. The keyboard is used to enter commands and the remote host returns the results only in text form. The mouse cannot be used for input to the remote host, and no graphical output can be displayed. A text-based interface via SSH but with the addition of Exceed running in the background. This works as above, but now the host can launch windows to display graphical output from programs. A Windows style desktop via Exceed. This provides a fully-featured graphical desktop running on granby. Other hosts can be accessed through this desktop. If you are connecting to a University Unix/Linux server, such as granby, from outside the University, you may have to use a text-based interface as in the first method above, since it may be impossible or impractically slow to use graphical displays. A text-based interface is also preferable for short sessions. 4. Text-based (command line) interface via SSH On PCs in public access areas, SSH programs can be run from the NAL folder called Accessing the Internet. The SSH Secure Shell program is recommended. (An alternative is Putty, available in the same NAL folder.) To connect using SSH Secure Shell, double-click on the NAL icon which image is shown below: A window like the one shown below will be launched: Press Quick Connect and in the resulting Connect to Remote Host window: a) Type granby in the Host Name box (from off-campus you will need to type the full address granby.nottingham.ac.uk) b) Type your unix username in lower case in the User Name box 2 Tutorial Guide to the IS Unix Service

5 c) Press Connect. d) In the window which appears, enter your password. (To delete what you have typed, you can use the back space key or highlight your input with the mouse and press delete.) (Note: You can also connect to caunton or an HPC clone by typing the appropriate host name.) After logging in to granby, you can practise with the following commands in order. Command: pwd ls pico ls ls -l mkdir ls and ls -l cd pwd cd cp Comments: Stands for print working directory. Displays path of current directory. Initially will show home directory path: /home/username Lists the contents of your current directory. Initially it will be empty. This starts the text editor pico. Use this to create a file in your home directory, called, say, beeston.txt After creating and saving a file, try the ls command again. This is an example of an option with a command. The l option of the ls command produces a long list with more information about each file. Stands for make directory. Creates a new directory. For example: mkdir green creates a directory called green in the current directory. This is an example of a parameter (green) with a command (mkdir). Now with a file and a directory in the home directory, try the commands ls and ls -l. Stands for change directory. Changes the current working directory. For example: cd green makes green the current working directory. Now try the pwd command and the output will be of the form: /home/username/green To change back to the home directory, use the command: cd.. The.. (two dots) stands for the parent directory and this command changes to the directory containing the current directory. Note that the command cd without any parameter always changes to the home directory. Stands for copy. It takes two parameters and copies an existing file into another one. For example: cp beeston.txt dunkirk will create a file called dunkirk with the contents of the file beeston.txt. (If a file with the name dunkirk already existed, it would be replaced by the new file.) If the second parameter is a directory, the file is created in that Tutorial Guide to the IS Unix Service 3

6 ls -l mv rm and rmdir ls -lt and ls -ltr directory. Thus: cp beeston.txt green will create a file in green called beeston.txt as a copy of the file beeston.txt in the home directory. The command: cp beeston.txt green/city.txt will create a file in green called city.txt as a copy of the file beeston.txt which is in the home directory. Try ls -l in the home directory. Change to the directory green (using cd). Try ls -l in this directory. Change back to home directory. Try ls in the following form: ls -l green This is an example of a command with an option l and a parameter green. Stands for move. It takes two parameters and moves (or renames) a file to the new name. For example: mv dunkirk radford will, in effect, rename the file dunkirk as radford. It can also be used in the following forms: mv radford green which moves the file radford to the directory green with the name radford. You can give the moved file a different name by issuing the following command: mv radford green/hyson This would move the file radford to the directory green and give it the name hyson. rm stands for remove. Deletes a file. With option -i it prompts for confirmation before deleting the file. The rmdir command deletes a directory, but only if the directory has been emptied. The ls command also has an option t which causes the files to be listed in time order, with the latest appearing first in the list. Adding the option r reverses the order of the list. To see the effect, first create two files in this order: cp beeston.txt a1 cp beeston.txt z9 Now try the following three commands and check the order of the list: ls -l ls -lt ls -ltr passwd This is used to change your password. The password must be at least 6 characters long and in addition to alphanumeric characters also contain at least one non-alphanumeric character. logout This is used to end your session. You can also press ctrl-d. You can also end your session by doing disconnect in SSH. This is found in the File menu as well as on a button on the toolbar. 4 Tutorial Guide to the IS Unix Service

7 Multiple sessions Within an SSH session to a host, you can launch another session to the same host by selecting Window from the top menu bar and then selecting New Terminal. There is also an icon for it in the toolbar. With two sessions, you could, for example, view the contents of two different directories in different windows. 5. Text-based (command line) interface via SSH with Exceed running in background In addition to logging in via SSH as above, launch Exceed for SSH. This icon is in the same NAL folder (Accessing the Internet). When it is running, all you will notice is the presence of the Exceed tab in the Windows Task Bar. Now issue the command xclock. An X window will open, displaying a clock showing the current time. The following actions can be performed on this window using the mouse: moving, resizing, minimizing, maximizing, and closing. The following are some commands which run graphical applications or utilities on granby that you can issue and see the effect: maple -cw a mathematical application nedit an editor for text files bluefish an editor for html files kview viewer for graphical images firefox a World Wide Web browser To close Exceed, right-click on the Exceed tab in the Windows Taskbar and select close. 6. Windows style desktop on granby For this you need to launch Exceed for host login from its icon in the Accessing the Internet folder. After starting it, proceed as follows: 1. On the screen headed XDMCP Display Manager Chooser, select granby by either double-clicking on it or left-click on it and press the OK button. This screen looks as below (although you will see some other host names as well as granby): Tutorial Guide to the IS Unix Service 5

8 2. Then the following welcome screen appears, in which you type your username and click OK (or press Enter): 3. On the next welcome screen, before typing your password, you must first select the KDE 3 desktop. This is done as follows: a) Press and hold the Options button to display the drop-down menu. b) Bring the mouse pointer down to Session. c) In the right-hand menu that appears, click on KDE 3. d) Now make sure that the KDE 3 logo has appeared in the box on the right of the login window. You will see the screen shown above as you perform the last step in selecting the KDE 3 desktop. Note that selecting the KDE 3 desktop is only necessary the first time a username logs in. On subsequent logins under that username, KDE 3 will be selected by default. After this, type your password and click OK (or press Enter). 2. When you launch this desktop for the first time: a) The Welcome to KDE 3 screen appears. We suggest that you select Skip Wizard on it, and then Quit and Keep on the next screen in order to close this wizard. b) After the desktop launches, two further information windows are displayed. You can close these as well. c) Now you are looking at the desktop. The black background is printed with guidance on how you can change the wallpaper to something you like. 6 Tutorial Guide to the IS Unix Service

9 Points to note about using the desktop In this desktop only a single left click on the mouse is required to launch or open an item (rather than a double click). There may be a delay before there is any response to a left-click because you are communicating with a remote host. Using a right click at any point, you can display a drop-down menu of available actions. Basic features of the KDE desktop The Panel: This is the bar across the bottom of the desktop, with various buttons on it, as shown below. View of left side of panel: K Application Control Home Xterm Desktops Starter Centre K Application Starter button: This displays a pull-up menu whose items have further sub-menus. Everything you can do in the desktop is contained within these menus. The other buttons are short cuts to commonly required actions. Control Centre button: Launches the Control Centre which is used to customize the desktop. Practise with changing the wallpaper as follows through the Control Centre: 1. Expand Look & Feel. 2. Under it, click Background. 3. Select Wallpaper tab. 4. Click the down-arrow in the line beginning Wallpaper. A list of image filenames is displayed. 5. Take the mouse pointer to any filename and the corresponding image will be displayed in a box above it (which looks like a monitor screen). 6. Click on the desired filename to select it. 7. Press the Apply button at the bottom to apply the wallpaper. With the Control Centre still open, practise with the window controls of moving, resizing, minimizing and maximizing this window. XTerm button: Launches a text-mode window, similar to the text-based interface you used earlier, in which you can issue Unix commands. If you issue a command to run a graphical application or utility, a window will open displaying the graphical output, in which you can use graphical features. Tutorial Guide to the IS Unix Service 7

10 You can also connect to other servers (e.g. caunton or an HPC clone) from an XTerm window by using the ssh command, for example: ssh caunton Desktops: By default KDE3 creates four desktops. Selecting the buttons labeled 1, 2, 3 or 4 brings up the corresponding desktop. You can vary the number of desktops available by going to: Control Centre > Look&Feel >Desktop and selecting the tab Number of Desktops. Home button: This launches a file manager whose appearance is shown below. Note with the following features: Location line shows which folder s contents are being displayed. A tree view of folders is in the left column. In the main window, files and folders are represented by appropriate icons. This iconic view can be changed to the Detailed List view by buttons on the toolbar as well as by the menu selection View > View Mode. Files and folders can be filtered, i.e. only those of a certain type displayed, by going to Tools > View Filter. (To see all contents again, select Reset.) Left-click on a file to view its contents. Note change in the path in Location. The up-arrow or the left-arrow in the toolbar can be used to return to the parent folder or the last folder respectively. Right-click on file to see a drop-down menu of actions on the file (New Window to open it in an editing window, rename, delete, copy, etc.) Left-click on a folder to view its contents. Right-click on a folder and select New Window to open it in a new file manager window. Now drag and drop files from one window to the other and, when dropping, select copy or move in the destination folder. Files and folders can also be dragged to the desktop and placed on it as links (short cuts). 8 Tutorial Guide to the IS Unix Service

11 Right-click in the background of the contents window to display a drop-down menu to select an action (e.g. Create New to create folder or file). Panel: Buttons on the panel can be removed or moved by right-clicking on a button and selecting the appropriate action. The Panel can be configured by, for example, adding buttons for other applications. To do this, either right-click on an empty part of the Panel or press the K button and select Configure Panel in the pull-up menu. To log out from Exceed, press the K button and select the bottom item in the pull-up menu called logout. There is also a button for it towards the right hand end of the Panel. Do not simply close the Exceed application in Windows XP. 7. File permissions a brief description There are 3 types of permission of access to files and directories: r (for read): allows file and directory contents to be listed. w (for write): allows file to be edited and deleted. x (for execute): applies to script files and other executable files and to directories. There are 4 categories of user: user The user you are logged in as. group all usernames having the same first two letters or a special group. other everyone else. all everyone. Each category can be assigned any combination of rwx permissions. Permissions on files can be seen by issuing the command ls -l and looking at the set of characters in the first column. They are also displayed in the Home file manager if the Detailed List view is selected. If you want files within a directory under your username to be readable by others, then you must give the directory x and r access as well as r access to the files. If you are managing webpages then all files that you wish to be accessible to people from a web browser must be made readable to the category of other. The unix command to change permissions on files and directories is: chmod 8. Selecting groups of files by pattern matching When specifying names of files and folders in commands, the name can be specified as a pattern rather than one exact name. The command will then act on all files and folders whose names match that pattern. The * character is used in a pattern to stand for any character. For example: b* matches all names beginning with b *.txt matches all names ending in.txt pic*.jpg matches all names beginning with pic followed by any characters, or no character, followed by.jpg Tutorial Guide to the IS Unix Service 9

12 The echo command can be used to list the names that match a pattern. For example: echo *.txt A pattern can be used for names when issuing commands as in the examples below: cp *.txt green copies all *.txt files from current folder to the folder green rm bc* deletes all files in current folder whose names begin with bc chmod a=r * sets read permission for everyone on all files in current directory. 9. Transferring files between the server and a PC There are several FTP programs available for transferring files between a Unix host and a PC which are available in the NAL folder Accessing the Internet. Here we look at SSH FTP Client. This can be launched independently or from within SSH Secure Shell while logged in to the host. The interface is also very similar to Secure Shell. If launched independently, you need to connect to the Unix host by doing Quick Connect (similar to logging in through Secure Shell). After connecting, you will see two windows side by side. The left shows the files and folders on the local system (the PC) and the right shows the same on the remote system (the Unix host) in your home directories on each system. If FTP is launched from within Secure Shell when you are already logged in to the Unix host, then you see these two windows without needing to login. In both windows you can navigate in the filestore to display the source folder (from which you want to copy files or folders) in one window and the destination folder (to which you wish to copy) in the other window. Then you can drag files and folders from the source to the destination. 10. Help information The man command (standing for manual) can be used to display pages of information, known as man entries, about particular commands. For example, man ls will display the entry for the ls command. The listing of the entry pauses when the screen becomes full. Press Enter for the next screenful or press q to quit. In the man entry you can find out from the Options section which options are available with that command and what effect they have. There is an Examples section near the end of the entry giving some examples of how to use the command. To use the man command you have to know the name of the command about which you require information. If you want to find out the name of the command that performs a certain action (e.g. delete a file), there is a command available on granby called howto. For example, the commands: howto delete howto copy will, in each case, list names of Unix commands that can perform those actions. 10 Tutorial Guide to the IS Unix Service

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful

More information

University of Toronto

University of Toronto 1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008. Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...

More information

Web File Management with SSH Secure Shell 3.2.3

Web File Management with SSH Secure Shell 3.2.3 Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols

Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols Cardiff University Cardiff School of Computer Science Prifysgol Caerdydd Ysgol Cyfrifiadureg Caerdydd Introductory Note 711 & 811 Remote Access to Computer Science Linux Files Using Secure Shell Protocols

More information

Introduction to the UNIX Operating System and Open Windows Desktop Environment

Introduction to the UNIX Operating System and Open Windows Desktop Environment Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems

More information

C++ Programming on Linux

C++ Programming on Linux C++ Programming on Linux What is Linux?! an operating system! Unix-like CS 2308 Spring 2013 Jill Seaman! Open source! created in 1992 by Linus Torvolds! can be installed on a wide variety of hardware mobile

More information

Introduction to Windows XP

Introduction to Windows XP Introduction to Windows XP Academic Computing Support Information Technology Services Tennessee Technological University January 2003 1. What s new in XP New colorful interface. More stable than 9x/Me

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Using SSH Secure File Transfer to Upload Files to Banner

Using SSH Secure File Transfer to Upload Files to Banner Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system

More information

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session

More information

User Guide Version 3.0

User Guide Version 3.0 User Guide Version 3.0 Page 2 of 12 Summary Contents 1 INTRODUCTION 3 1.1 WHAT IS FTP? 3 1.2 FTP REQUIRED INFO 3 2 FTP MANAGER 4 2.1 CREATING USERS IN FTP MANAGER 5 2.1.1 Creating a Username in FTP Manager

More information

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES) USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful

More information

Creating a Website with Publisher 2013

Creating a Website with Publisher 2013 Creating a Website with Publisher 2013 University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology

More information

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

WinSCP PuTTY as an alternative to F-Secure July 11, 2006 WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007 PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

VERITAS NetBackup 6.0

VERITAS NetBackup 6.0 VERITAS NetBackup 6.0 Backup, Archive, and Restore Getting Started Guide for UNIX, Windows, and Linux N15278C September 2005 Disclaimer The information contained in this publication is subject to change

More information

How To Configure CU*BASE Encryption

How To Configure CU*BASE Encryption How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE

More information

Lab 1 Beginning C Program

Lab 1 Beginning C Program Lab 1 Beginning C Program Overview This lab covers the basics of compiling a basic C application program from a command line. Basic functions including printf() and scanf() are used. Simple command line

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Lab 1: Create a Personal Homepage

Lab 1: Create a Personal Homepage Objectives: Lab 1: Create a Personal Homepage Understand the basics of HTML Create a personal website, if you do not have one Learn how to submit your assignments Preparation 1. Create a folder with the

More information

Working With Your FTP Site

Working With Your FTP Site Working With Your FTP Site Welcome to your FTP Site! The UnlimitedFTP (UFTP) software will allow you to run from any web page using Netscape, Internet Explorer, Opera, Mozilla or Safari browsers. It can

More information

Decision Support AITS University Administration. EDDIE 4.1 User Guide

Decision Support AITS University Administration. EDDIE 4.1 User Guide Decision Support AITS University Administration EDDIE 4.1 User Guide 2 P a g e EDDIE (BI Launch Pad) 4.1 User Guide Contents Introduction to EDDIE... 4 Log into EDDIE... 4 Overview of EDDIE Homepage...

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

CGS 1550 File Transfer Project Revised 3/10/2005

CGS 1550 File Transfer Project Revised 3/10/2005 CGS 1550 File Transfer Project Revised 3/10/2005 PURPOSE: The purpose of this project is to familiarize students with the three major styles of FTP client, which are: Pure (FTP only), character-based,

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

OnDemand. Getting Started Guide

OnDemand. Getting Started Guide OnDemand Getting Started Guide Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including facsimile

More information

Remote Desktop Services

Remote Desktop Services Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows

More information

WinSCP for Windows: Using SFTP to upload files to a server

WinSCP for Windows: Using SFTP to upload files to a server WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Lab 8: Configuring Backups

Lab 8: Configuring Backups CompTIA Security+ Lab Series Lab 8: Configuring Backups CompTIA Security+ Domain 2 - Compliance and Operational Security Objective 2.7: Execute disaster recovery plans and procedures Document Version:

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

Installing the SSH Client v3.2.2 For Microsoft Windows

Installing the SSH Client v3.2.2 For Microsoft Windows WIN1011 June 2003 Installing the SSH Client v3.2.2 For Microsoft Windows OVERVIEW... 1 SYSTEM REQUIREMENTS... 2 INSTALLING THE SSH PACKAGE... 2 STARTING THE PROGRAMS... 5 USING THE SHELL CLIENT... 8 USING

More information

FTP Manager. User Guide. July 2012. Welcome to AT&T Website Solutions SM

FTP Manager. User Guide. July 2012. Welcome to AT&T Website Solutions SM July 2012 FTP Manager User Guide Welcome to AT&T Website Solutions SM We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain a successful

More information

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Using. - Training Documentation -

Using. - Training Documentation - Using - Training Documentation - Table of Contents 1. Overview of Argos..1 2. Getting started.....1 Accessing Argos...1 Login to Argos... 1 Log-off.... 2 Password reset or change... 2 3. Understanding

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

How to FTP (How to upload files on a web-server)

How to FTP (How to upload files on a web-server) How to FTP (How to upload files on a web-server) In order for a website to be visible to the world, it s files (text files,.html files, image files, etc.) have to be uploaded to a web server. A web server

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Introduction to MS WINDOWS XP

Introduction to MS WINDOWS XP Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The

More information

Senior Systems Cloud Services

Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

Site Maintenance Using Dreamweaver

Site Maintenance Using Dreamweaver Site Maintenance Using Dreamweaver As you know, it is possible to transfer the files that make up your web site from your local computer to the remote server using FTP (file transfer protocol) or some

More information

Uploading files to a web server using SSH Secure Shell 3.2.9

Uploading files to a web server using SSH Secure Shell 3.2.9 Uploading files to a web server using SSH Secure Shell 3.2.9 Practical workbook Aims and Learning Objectives By the end of this course you will be able to: Upload your documents (for example HTML files)

More information

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

Content Management System Help. basic tutorial on Evergreen s CMS

Content Management System Help. basic tutorial on Evergreen s CMS Content Management System Help cms.evergreen.edu Tips, tricks and basic tutorial on Evergreen s CMS Contents Vocabulary Login Opening a page Editing a page Creating a new page Inserting internal and external

More information

Getting Started with KompoZer

Getting Started with KompoZer Getting Started with KompoZer Contents Web Publishing with KompoZer... 1 Objectives... 1 UNIX computer account... 1 Resources for learning more about WWW and HTML... 1 Introduction... 2 Publishing files

More information

Installation Guidelines (MySQL database & Archivists Toolkit client)

Installation Guidelines (MySQL database & Archivists Toolkit client) Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed

More information

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2

More information

Document Management Quick Reference Guide

Document Management Quick Reference Guide Documents Area The Citadon CW folders have the look and feel of Windows Explorer. The name of the selected folder appears above, and the folder's contents are displayed in the right frame. Corresponding

More information

Fairfield University Using Xythos for File Sharing

Fairfield University Using Xythos for File Sharing Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3

More information

Creating a Website with MS Publisher

Creating a Website with MS Publisher Creating a Website with MS Publisher Getting Started with the Wizard...1 Editing the Home Page...3 Editing Text...3 Editing and Inserting Graphics...4 Inserting Pictures...6 Inserting a Table...6 Inserting

More information

6 USING WINDOWS XP 6.1 INTRODUCTION

6 USING WINDOWS XP 6.1 INTRODUCTION 6 USING WINDOWS XP 6.1 INTRODUCTION The windows operating system started with the introduction of Windows OS and Windows for work group for networking. Since then it has come a long way and Windows 95,

More information

After going through this lesson you would be able to:

After going through this lesson you would be able to: 18 :: Data Entry Operations 2 Operating System 2.1 INTRODUCTION The operating system in these days uses a graphical user interface (GUI). Here you do not have to remember all the commands by heart. The

More information

WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows

WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows Overview WinSCP is an SFTP (Secure File Transfer Protocol), FTP (File Transfer Protocol), and SCP (Secure Copy Protocol) application

More information

Linux Tutorial 1. Prepared by Mohamed Elmahdy. M.Stonebank. (surrey.ac.uk) under Creative Commons licence.

Linux Tutorial 1. Prepared by Mohamed Elmahdy. M.Stonebank. (surrey.ac.uk) under Creative Commons licence. Linux Tutorial 1 Prepared by Mohamed Elmahdy 1 This Linux tutorial is a modified version of the tutorial A beginners guide to the Unix and Linux operating system by M.Stonebank. (surrey.ac.uk) under Creative

More information

FileZilla: Uploading/Downloading Files to SBI FTP

FileZilla: Uploading/Downloading Files to SBI FTP FileZilla Download and Installation Instructions FileZilla is a free software that uses SourceForge as an installation provider. SourceForge is bundling the FileZilla software with other products that

More information

Mikogo User Guide Linux Version

Mikogo User Guide Linux Version Mikogo User Guide Linux Version Table of Contents Registration 3 Downloading & Running the Application 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch Presenter 8 Remote Control

More information

Using Windows XP and File Management Handout (Staff)

Using Windows XP and File Management Handout (Staff) Using Windows XP and File Management Handout (Staff) The XP Interface Logging on to your computer. Logging in on campus. Analogy of a safe. Login screen Domains - FFLDU, Fairfield, Local Machine, Prep

More information

HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl

HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl In order to access the A&B server with a view to uploading or downloading materials, any FTP client software can be used. If

More information

Results CRM 2012 User Manual

Results CRM 2012 User Manual Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation

More information

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Miami University RedHawk Cluster Connecting to the Cluster Using Windows Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.

More information

Joomla! 2.5.x Training Manual

Joomla! 2.5.x Training Manual Joomla! 2.5.x Training Manual Joomla is an online content management system that keeps track of all content on your website including text, images, links, and documents. This manual includes several tutorials

More information

Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas

Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas ACF Supercomputer Access Instructions 1 Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas ACF Supercomputer Access Instructions 2 Contents Instructions

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

WebEx Meeting Center User's Guide

WebEx Meeting Center User's Guide WebEx Meeting Center User's Guide Table of Contents Accessing WebEx... 3 Choosing the scheduler that works for you... 6 About the Quick Scheduler Page... 6 About the Advanced Scheduler... 8 Editing a scheduled

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

SSH and Basic Commands

SSH and Basic Commands SSH and Basic Commands In this tutorial we'll introduce you to SSH - a tool that allows you to send remote commands to your Web server - and show you some simple UNIX commands to help you manage your website.

More information

Navigating within the GNU/Linux Filesystem

Navigating within the GNU/Linux Filesystem Navigating within the GNU/Linux Filesystem The purpose of this section is to provide a few basic GNU/Linux commands to aide new users locate areas on the ODU Turing cluster. The commands presented are

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Connecting to LUA s webmail

Connecting to LUA s webmail Connecting to LUA s webmail Effective immediately, the Company has enhanced employee remote access to email (Outlook). By utilizing almost any browser you will have access to your Company e-mail as well

More information

This Deployment Guide is intended for administrators in charge of planning, implementing and

This Deployment Guide is intended for administrators in charge of planning, implementing and YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment

More information

Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC

Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC The ITC has tested several SFTP client programs for submitting digital data to the ITC. These include

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Install FileZilla Client. Connecting to an FTP server

Install FileZilla Client. Connecting to an FTP server Install FileZilla Client Secure FTP is Middle Georgia State College s supported sftp client for accessing your Web folder on Webdav howeve you may use FileZilla or other FTP clients so long as they support

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

This manual provides information and instructions for Mac SharePoint Users at Fermilab. Using Sharepoint from a Mac: Terminal Server Instructions

This manual provides information and instructions for Mac SharePoint Users at Fermilab. Using Sharepoint from a Mac: Terminal Server Instructions Using SharePoint from a Mac: Terminal Server Instructions This manual provides information and instructions for Mac SharePoint Users at Fermilab. Page 0 Contents Fermilab Terminal Server Introduction...2

More information

The FlexiSchools Online Order Management System Installation Guide

The FlexiSchools Online Order Management System Installation Guide The FlexiSchools Online Order Management System Installation Guide Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Zebra Drivers FlexiSchools Online Order

More information

FUGU - SFTP FOR MACS- REFERENCE GUIDE

FUGU - SFTP FOR MACS- REFERENCE GUIDE Information Technology FUGU - SFTP FOR MACS- REFERENCE GUIDE INTRODUCTION This document assumes that Fugu is already installed on your computer. If you don t have Fugu, CSUN faculty, staff and students

More information

Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and

Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and Phone Manager FAQ s Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and has a cross on it. 5 Q. Some options

More information

MATLAB on EC2 Instructions Guide

MATLAB on EC2 Instructions Guide MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.

More information

StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started

StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started Contents StrikeRisk v6.0 Introduction 1/1 1 Installing StrikeRisk System requirements Installing StrikeRisk Installation troubleshooting

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

VoIP Quick Start Guide

VoIP Quick Start Guide VoIP Quick Start Guide VoIP is made up of three elements: The Phone The Software (optional) The Web Version of the software (optional) Your new voice mail can be accessed by calling (971-722) 8988. Or,

More information

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc. XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been

More information

Secure File Transfer Protocol User Guide

Secure File Transfer Protocol User Guide Ministry of Health Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: November 12, 2013 Next Update: Version: 1.6 Approvals Signature Date Director, DA&IM Signature

More information

The FlexiSchools Online Order Management System Installation Guide

The FlexiSchools Online Order Management System Installation Guide The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 18 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato

More information

FireBLAST Email Marketing Solution v2

FireBLAST Email Marketing Solution v2 Installation Guide WELCOME to fireblast, one of the Industry s leading Email Marketing Software Solutions for your business. Whether you are creating a small email campaign, or you are looking to upgrade

More information