2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
|
|
|
- Hilda Pierce
- 10 years ago
- Views:
Transcription
1 Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles Advanced Session... Properties 6 3 Session profile... wizard 7 4 User settings Application... preferences 9 Part III Working with SecEx 10 1 Server Login File transfer ASCII / Binary... Transfer 13 4 Quick view Deleting remote... files 15 6 Secure Command... Prompt 16 7 X11 Forwarding Folder Bookmarks Command... mode Executing... remote files Verbose output Saving the... sessesion log 22 Part IV Technical Data 23 1 Technical specifications What is Secure... Shell? 23 3 DNS/IP Spoofing Part V About 26 1 About SecEx About Bytefusion... Ltd. 27
2 II SecEx Secure Shell Client Index 0
3 SecEx Overview 3 1 SecEx Overview 1.1 What is SecEx? SecEx is a network file manager and secure terminal emulator that allows encrypted file transfer between your PC and network servers running Secure Shell. SecEx seamlessly interoperates with either SSH1 or SSH2 servers on both Unix and Windows operating systems. You can transfer files to and from remote servers, view remote files, and execute remote files on your local PC - using strong, industry standard encryption. If you are a travelling executive who wants to access files on a corporate server or a system administrator maintaining a remote site, SecEx is your complete remote file management solution. SecEx automatically detects available carrier protocols available on server systems. Newer SSH servers tend to make SFTP (Secure FTP) available while older secure shell implementations feature SCP ( Secure Copy Program). SecEx also shields against IP and DNS spoofing by recording a server's public host key. During subsequent connection attempts, the known host key is compared to the host key offered by the server. See IP/DNS spoofing for details. See Quick Start if you just want to get "on the road". Secure Terminal Emulator : SecEx supports a "Secure Command Prompt" facility for remote systems which is equivalent to a Windows (TM) command prompt. "Secure Command Prompt" supports fully interactive programs or facilities normally offered by a VT100+ terminal emulators.
4 4 SecEx Secure Shell Client Secure Shell Introduction : SSH Secure Shell is a replacement for the telnet command and supports encrypted client / server connections. Secure file transfer is achieved via two secure shell supplements : SCP and SFTP. SCP ( secure copy program) accompanies most SSH version 1 servers. SFTP (Secure FTP) accompanies most SSH version 2 servers. Secure Shell was conceived as an academic project at the University of Finland in Open Source initiatives have since emerged from the publicly available source code as well as commercial versions of Secure Shell. The lettering "ssh" in its lowercase rendition is a trademark owned by SSH Communications Security. Session Profiles : A session profile holds all information necessary to connect to a Secure Shell server. Server Login : To log into a remote server, simply double-click the associated session profile. File Transfer : After successfully logging into a SSH server, you may browse the remote file system and copy files to and from the server. Simply, select the files you wish to copy and drag them to a directory on your local system. Quick View : To view the contents of a file on the remote server, right-click the file with your mouse and select "Quick View" from the pop-up menu. Technical Data : SecEx is compatible with Secure SSH servers. The default mode of communication is SSH protocol version 2 with automatic fall-back to SSH protocol version 1. Secure file transfer to and from SSH servers is achieved via SFTP ( Secure FTP ) where available, with automatic fall-back to SCP ( Secure Copy Program ). Host authentication is via 1024 bit DSS / RSA keys. Supported encryption modes are 3DES, Blowfish and AES. 3DES is the default mode of encryption depending on server-side availability. 1.2 Quick start You just want to connect to Secure Shell server and start transferring files? To connect to a Secure Shell server you will need to tell SecEx about the server's IP address or DNS name and provide your login information. This information is called a session profile. You can add a session profile via the wizard or the New Session Profile Dialog from the "File" menu as shown below.
5 SecEx Overview 5 Once you have entered your session profile, SecEx will make a corresponding entry for your SSH server in the remote systems pane. Simply click this entry to connect to the server. 2 Configuring SecEx 2.1 Session Profiles A session profile holds all information necessary to connect to a Secure Shell server. To create a new session profile, select "New Session Profile" from the "File" menu. The following items are required: Session Profile Name A descriptive name. This name will appear in the remote systems pane on the right. Secure Shell Server IP address or DNS name of the remote system User Name Your login name on the remote system Password Your password on the remote system Click the Advanced... button to access the Advanced Session Properties dialog.
6 6 SecEx Secure Shell Client 2.2 Advanced Session Properties Advanced Session Properties lets you fine tune a session profile. To access the Advanced Session Properties dialog, click the Advanced... button in Session Profiles. The following items can be configured: Initial Remote Directory On UNIX systems this will be your home directory, usually "/home/<your name>". For UNIX root users this will typically be "/root". Please note that the file system root "/" is made available by default in addition to your home directory. On Windows systems the initial directory is auto detected and this parameter is ignored. Preferred Cipher The preferred cipher parameter determines the encryption algorithm SecEx attempts to negotiate with the server for data transfer. What algorithm is selected also depends on what ciphers are made available by the server. Possible values are : 1. auto-detect -> Let SecEx chose 2. 3des -> Use Triple DES encryption 3. blowfish -> Use Blowfish encryption 4. aes -> Use Advanced Encryption Standard ( SSH2 servers only ) Server Port The port number of the Secure Shell server on the remote system. It is safe to leave this value unchanged. Identify As This parameter determines the terminal type of the Secure Command Prompt. Common values for this parameter are "xterm" and "linux". If you are unsure what terminal type your server requires, please consult your system administrator. Display Location Were your X11 server is located. It is safe to leave this parameter unchanged if are unsure or you do
7 Configuring SecEx 7 not have an X11 server installed on your system. Server Performance This parameter regulates the transfer speed for SFTP data transfer. Some servers may not handle speeds in the area marked red. Speeds marked a blue should be safe with all server implementations. 2.3 Session profile wizard The session profile wizard guides you through the process of entering a new session profile. See New Session Profile for a description of the items contained in a session profile.
8 8 SecEx Secure Shell Client 2.4 User settings You can define user settings to be used as default login information on all new session profiles. The values you provide here will not alter user information in existing session profiles. My User Name Your login name on the remote system Password Your password on the remote system Home ( Unix only ) On UNIX systems this will be your home directory, usually "/home/<your name>". On Windows systems the initial directory is auto detected.
9 Configuring SecEx Application preferences Use the application preferences dialog to customize the behavior of SecEx. Default file viewer Application to use for " quick view". Where to store downloads Default download directory for data transferred from remote systems. Other download directories may be selected at runtime. Where to store temporary files Remote files downloaded for "quick view" or execution on the local system are stored in the }temporary working folder specified here.
10 10 SecEx Secure Shell Client 3 Working with SecEx 3.1 Server Login To log into a remote server, simply double-click the associated session profile icon in the "Remote Systems" pane on the right. Secex will contact the server and submit your user name and password for authentication.
11 Working with SecEx 11 Upon successful login, SecEx will display your home directory, the system root directory, and any relevant server information such as SSH version number and file transfer mode.
12 12 SecEx Secure Shell Client 3.2 File transfer After successfully logging into a SSH server, you may browse the remote file system and copy files to and from the server. Simply, select the files you wish to copy and drag them to a directory on your local system. The session log window at the bottom will indicate the progress. Clicking "Cancel" will terminate the file transfer and log you out of the server.
13 Working with SecEx ASCII / Binary Transfer The default mode of file transfer is binary. Unless otherwise directed, SecEx will transfer all files in binary mode. You can force ASCII transfer of files via the copy buttons on the toolbar marked with an "a" as shown below. Alternatively, SecEx can automatically transfer files with specific extensions or certain names in ASCII mode. Simply click the "ASCII Settings" button on the toolbar and define extensions and files you wish to transfer in ASCII mode. Extensions are prefixed with "*.". Be sure to enable this feature by selecting "Transfer listed files in ASCII mode".
14 14 SecEx Secure Shell Client 3.4 Quick view To view the contents of a file on the remote server, right-click the file with your mouse and select "Quick View" from the pop-up menu. The file with be downloaded to the temporary working folder and opened in the default viewer. Both, temporary working folder and default viewer are configured under "Application Preferences".
15 Working with SecEx Deleting remote files To delete a file on the remote server, right-click the file with your mouse and select "Delete" from the pop-up menu. Note that depending on your access privileges on the remote system, you may not be allowed to delete some files.
16 16 SecEx Secure Shell Client 3.6 Secure Command Prompt How do I get a secure terminal on a Secure Shell Server? SecEx supports a "Secure Command Prompt" facility for remote systems which is equivalent to a Windows (TM) command prompt. "Secure Command Prompt" supports fully interactive programs or facilities normally offered by a VT100+ terminal emulators.
17 Working with SecEx 17 When you are logged into a Secure Shell Server, you can click on the toolbar button shown above to activate a Secure Command Prompt on the remote system. Secure Command Prompt will automatically log you into your default shell on the remote SSH server. When logging into a Windows SSH Server you will see the familiar "cmd.exe" on Windows NT/2000 or "command.com" on 95/98 systems. When logging into a SSH server running a UNIX style operating system, you will be presented with the same shell you normally use, Bourne Shell, Z-Shell, etc. When navigating the remote files system of a SSH Server, you may right-click on any folder and select "Secure Command Prompt Here" to obtain a secure shell prompt in that specific folder.
18 18 SecEx Secure Shell Client Windows, Windows NT, and Windows 2000 are trademarks of Microsoft Corporation. 3.7 X11 Forwarding To securely forward X11 sessions from a SSH server to your PC, simply click the "Secure X11 Terminal" button after logging in to the server. This will create a Secure Command Prompt session which is X11 enabled. All X11 traffic for X based applications launched from this session will be encrypted. Please note that availability of this feature depends both on X11 forwarding support on the Secure Shell server as well as the presence of an X11 display server on your PC. You might also have to adjust the X11 display location parameter under Advanced Session Properties to reflect the settings of your X11 display server. 3.8 Folder Bookmarks Folder bookmarks are similar to shortcuts on your desktop or bookmarks in your favorite web browser. If you frequently access files in a particular folder on a Secure Shell server, you might wish to bookmark that folder for easy access. To bookmark a folder, simply right-click on the folder with your mouse and select "Add to bookmarks" as shown below.
19 Working with SecEx 19 This will add the folder to the bookmarks node for the SSH server you are logged into. You can navigate, copy to, and copy from bookmarked folders in the same manner as when working with ordinary folders. 3.9 Command mode To enter command mode, select "Command Mode" from the "Tools" menu. This will enable you to execute SCP ( Secure Copy Program ) and SFTP ( Secure FTP ) commands directly. Output will be displayed in the session log window at the bottom. You will also be able to interact with the process by typing directly in the session log window, for example if asked to enter your password for the remote system.
20 20 SecEx Secure Shell Client The syntax for SecEx SCP client is reproduced below. Please note that SCP is stateless and does not maintain a session on the remote server. Thus one SCP command with server and logon information is required for every SCP operation performed. SecEx SCP Client Version 1.1 Usage: scp [switches] [user@]host:source target scp [switches] source [source...] [user@]host:target scp [switches] -ls user@host:directory scp [switches] -del user@host:file_to_delete scp [switches] -mkdir user@host:new_directory scp [switches] -rmdir user@host:directory_to_delete Switches: -r copy directories recursively -v show verbose messages -P port connect to specified port -pw passw login with specified password The syntax for SecEx SFTP client is as follows : SecEx SFTP Client Version 1.1 Usage : sftp [switches] user@host Switches : -P port Connect to specified port -pw passw Login with specified password -v Display verbose output Upon successful login, SFTP maintains a session on the remote server and SFTP shell until you log out. The SFTP shell commands available are as follows : SecEx SFTP Client Command Set ls - display folder information for server working directory cd <remote path> - change working directory on server lcd <local path> - change working directory on local system pwd - display current working directory on server lpwd - display current working directory on local system get <remote file> <local file> - fetch file from server put <local file> <remote file> - copy file to server mkdir <folder path> - create remote directory rmdir <folder path> - remove remote directory rm <file path> - remove file help - show this help information
21 Working with SecEx 21 exit - end sftp session 3.10 Executing remote files To execute a file from the remote server on your computer, right-click the file with your mouse and select "Open" from the pop-up menu. Please note that you will not be able to execute Unix binaries on your Windows computer. Certain files, such as ".bmp" image files for example, will have file relevant file associations on both Unix and Windows systems and will therefore be opened with the correct application on your computer. Before being able to execute the file locally, SecEx will download the file from the remote system and store it in the temporary working folder, as configured under Application Preferences Verbose output To display verbose output in the session log window, select "Verbose Output" from the "View" menu. This is useful if you are reporting problems or simply want to take a peek "under the hood". Verbose output is printed in a light grey font and contains details such as SSH protocol version number, host
22 22 SecEx Secure Shell Client key, as well as file transfer and encryption mode. See also Saving the session log Saving the sessesion log To save the session log, simple select "Save log as..." from the "File" menu. If you submit a bug report, please be sure to include a relevant verbose session log.
23 Working with SecEx 23 4 Technical Data 4.1 Technical specifications SecEx is compatible with Secure SSH servers. The default mode of communication is SSH protocol version 2 with automatic fall-back to SSH protocol version 1. Secure file transfer to and from SSH servers is achieved via SFTP ( Secure FTP ) where available, with automatic fall-back to SCP ( Secure Copy Program ). Host authentication is via 1024 bit DSS / RSA keys. Supported encryption modes are 3DES, Blowfish and AES. 3DES is the default mode of encryption depending on server-side availability. The selected encryption mode for each session is indicated in the verbose session log output. 4.2 What is Secure Shell? SSH Secure Shell is a replacement for the telnet command and supports encrypted client / server connections. Secure file transfer is achieved via two secure shell supplements : SCP and SFTP.
24 24 SecEx Secure Shell Client SCP ( secure copy program) accompanies most SSH version 1 servers. SFTP (Secure FTP) accompanies most SSH version 2 servers. SSH was conceived as an academic project at the University of Finland in Open Source initiatives have since emerged from the publicly available source code as well as commercial versions of Secure Shell. The lettering "ssh" in its lowercase rendition is a trademark owned by SSH Communications Security. 4.3 DNS/IP Spoofing IP spoofing is the creation of IP packets using someone else's IP address. DNS spoofing is the substitution of a different IP address for a DNS name. DNS spoofing is commonly achieved by corrupting the DNS database of the DNS server your computer connects to in order to match human readable computer names to physical IP addresses. In both instances, the computer you are connecting to is not the server you expect. This can be used, for example, to trick you into giving your server user name and password to the computer acting as the impostor. Alternatively, the impostor might simply act as a conduit whilst talking to the real server on your behalf. This is called a "Man-in-the-middle attack" and is commonly used to intercept network traffic without the knowledge of the original participants. SecEx protects against IP and DNS spoofing by recording each server's public host key. During subsequent connection attempts, the known host key is compared to the host key offered by the server. While an impostor might well offer the same public host key as the server whose identity it is trying to assume, it will fail the subsequent authentication challenge without the corresponding private key owned by the real server.
25 Technical Data 25 When connecting to a server for the first time, there is no reasonable and universal method of ensuring the key's authenticity. They key is therefore accepted by default. If you have any reason to believe that the server you are connecting to has been compromised, you should contact the server's administrator and personally verify the host key fingerprint. The host key fingerprint appears in the log window in verbose mode when logging on to the server.
26 26 SecEx Secure Shell Client 5 About 5.1 About SecEx SecEx Security Express Version 1.5 Copyright , Bytefusion Ltd. All Rights Reserved
27 About About Bytefusion Ltd. Bytefusion Ltd. 22 Duke Street Douglas, IOM IM1 2AY British Isles Inquiries:
WinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
Using SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.
XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been
Installing the SSH Client v3.2.2 For Microsoft Windows
WIN1011 June 2003 Installing the SSH Client v3.2.2 For Microsoft Windows OVERVIEW... 1 SYSTEM REQUIREMENTS... 2 INSTALLING THE SSH PACKAGE... 2 STARTING THE PROGRAMS... 5 USING THE SHELL CLIENT... 8 USING
Web File Management with SSH Secure Shell 3.2.3
Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide
F-Secure Securing the Mobile Distributed Enterprise F-Secure SSH User's and Administrator's Guide F-Secure SSH for Windows, Macintosh, and UNIX Secure Remote Login and System Administration User s & Administrator
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
FUGU - SFTP FOR MACS- REFERENCE GUIDE
Information Technology FUGU - SFTP FOR MACS- REFERENCE GUIDE INTRODUCTION This document assumes that Fugu is already installed on your computer. If you don t have Fugu, CSUN faculty, staff and students
Tutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
Changing Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI The Quality Assurance Review Center has tested several SFTP client programs for submitting digital
Quadro Configuration Console User's Guide. Table of Contents. Table of Contents
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
WinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
MATLAB on EC2 Instructions Guide
MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.
WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows
WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows Overview WinSCP is an SFTP (Secure File Transfer Protocol), FTP (File Transfer Protocol), and SCP (Secure Copy Protocol) application
How to use Mints@Home
How to use Mints@Home Citrix Remote Access gives Mints users the ability to access University Of Cambridge and MINTS resources from any computer, anywhere in the world,. The service requires a high-speed
SimpleFTP. User s Guide. On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America
SimpleFTP User s Guide On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America Website: http://www.on-core.com Technical Support: [email protected] Information: [email protected]
Using WinSCP to Transfer Data with Florida SHOTS
Using WinSCP to Transfer Data with Florida SHOTS Purpose: This document contains instructions for downloading, installing and using WinSCP, a free software download that enables the basic transfer of data
AnzioWin FTP Dialog. AnzioWin version 15.0 and later
AnzioWin FTP Dialog AnzioWin version 15.0 and later With AnzioWin version 15.0, we have included an enhanced interactive FTP dialog that operates similar to Windows Explorer. The FTP dialog, shown below,
Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.
Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC
Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC The ITC has tested several SFTP client programs for submitting digital data to the ITC. These include
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
Uploading files to a web server using SSH Secure Shell 3.2.9
Uploading files to a web server using SSH Secure Shell 3.2.9 Practical workbook Aims and Learning Objectives By the end of this course you will be able to: Upload your documents (for example HTML files)
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
FTP Server Configuration
FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Reflection X Advantage Help. Date
Reflection X Advantage Help Date Copyrights and Notices Attachmate Reflection 2015 Copyright 2015 Attachmate Corporation. All rights reserved. No part of the documentation materials accompanying this Attachmate
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
User guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
University of Toronto
1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.
Lab 8: Configuring Backups
CompTIA Security+ Lab Series Lab 8: Configuring Backups CompTIA Security+ Domain 2 - Compliance and Operational Security Objective 2.7: Execute disaster recovery plans and procedures Document Version:
WINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
Crystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
Tera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
SQL Server 2008 R2 Express Edition Installation Guide
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
Computing Service G72. File Transfer Using SCP, SFTP or FTP. many leaflets can be found at: http://www.cam.ac.uk/cs/docs
Computing Service G72 File Transfer Using SCP, SFTP or FTP many leaflets can be found at: http://www.cam.ac.uk/cs/docs 50 pence April 2003 Contents Introduction Servers and clients... 2 Comparison of FTP,
Using SSH Secure File Transfer to Upload Files to Banner
Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system
VPN CLIENT USER S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current
HPCC - Hrothgar Getting Started User Guide
HPCC - Hrothgar Getting Started User Guide Transfer files High Performance Computing Center Texas Tech University HPCC - Hrothgar 2 Table of Contents Transferring files... 3 1.1 Transferring files using
Introduction to UNIX and SFTP
Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
Configuration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Aspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
Installing LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols
Cardiff University Cardiff School of Computer Science Prifysgol Caerdydd Ysgol Cyfrifiadureg Caerdydd Introductory Note 711 & 811 Remote Access to Computer Science Linux Files Using Secure Shell Protocols
WS_FTP Professional 12
WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
1.6 HOW-TO GUIDELINES
Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: [email protected] Copyright
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Network Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
Network Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
Install FileZilla Client. Connecting to an FTP server
Install FileZilla Client Secure FTP is Middle Georgia State College s supported sftp client for accessing your Web folder on Webdav howeve you may use FileZilla or other FTP clients so long as they support
SmartSync Monitor Help
1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III
Linux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Tandem Systems, Ltd. WinAgents HyperConf. User s Guide
Tandem Systems, Ltd. WinAgents HyperConf User s Guide Tandem Systems, Ltd. 02.04.2010 Table of Contents Overview... 4 System Requirements... 4 Quick Start... 4 1-2-3-Start!... 4 1. Set default parameters
Getting Started with KompoZer
Getting Started with KompoZer Contents Web Publishing with KompoZer... 1 Objectives... 1 UNIX computer account... 1 Resources for learning more about WWW and HTML... 1 Introduction... 2 Publishing files
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
TAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
Nortel Networks Call Center Reporting Set Up and Operation Guide
Nortel Networks Call Center Reporting Set Up and Operation Guide www.nortelnetworks.com 2001 Nortel Networks P0919439 Issue 07 (24) Table of contents How to use this guide... 5 Introduction...5 How this
Configuring for SFTP March 2013
Configuring for SFTP March 2013 Overview You can upload files to and download files from Optimal Payments securely via SFTP. In order to be configured to upload and download files via SFTP, contact Technical
Working With Your FTP Site
Working With Your FTP Site Welcome to your FTP Site! The UnlimitedFTP (UFTP) software will allow you to run from any web page using Netscape, Internet Explorer, Opera, Mozilla or Safari browsers. It can
TS-800. Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.
TS-800 Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.4 dsas Table of Contents Overview... 1 Configuring OpenSSH Software
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Export & Backup Guide
Eport & Backup Guide Welcome to the WebOffice and WorkSpace eport and backup guide. This guide provides an overview and requirements of the tools available to etract data from your WebOffice or WorkSpace
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Installing the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
Georgia State Longitudinal Data System
Georgia State Longitudinal Data System FTP Client Installation Manual Version 3.0 Table of Contents 1 Overview... 3 2 FTP Connection Checklist... 3 3 FTP Installation Instructions... 4 4 Apply license
How To Install And Run Cesview Iii 1.3.3 (For New Users)
Cesview IIi 1.3 Installation and Automation Guide Contents: New ser Quick Guide Cesview IIi asic Installation o Additional Server Installation Notes o Additional rowser Only (Client) Installation Notes
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
Setup Instructions for Secure Hummingbird FTP
Setup Instructions for Secure Hummingbird is the terminal emulation software that allows users to connect their pc to the mainframe in a secure environment. For example, this allows users to connect to
WS_FTP Professional 12 and WS_FTP Home 12. Getting Started Guide
WS_FTP Professional 12 and WS_FTP Home 12 Getting Started Guide Welcome Ipswitch WS_FTP Professional 12 and Home 12 is the leading file transfer client with millions of users worldwide. You can easily
Install and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
vtcommander Installing and Starting vtcommander
vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
Network Management Card Wizard--1. Introduction... 1 Using the Network Management Card Wizard... 5
Contents Network Management Card Wizard--1 Introduction....................................... 1 Using the Network Management Card Wizard................ 5 File Transfers--10 Introduction......................................
Interact for Microsoft Office
Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
EventTracker Windows syslog User Guide
EventTracker Windows syslog User Guide Publication Date: September 16, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document is prepared to help user(s)
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
F-Secure SSH. for Windows. User s Guide
F-Secure SSH for Windows User s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
