Remote access and file transfer Getting files on and off Bio-Linux.

Slides:



Advertisements
Similar presentations
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast Allows both users to get jobs done, and also allows system administrators to sleep.
Advertisements

1 Automated SFTP Windows and SUN Linux and SUN. 2 Vocabulary  Client = local=the machine generating the SFTP request  Server = remote = the machine.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Setting up your System Contents Required Software Flip and flop servers at OSU Using WinSCP Using Putty Using ssh, scp from Linux terminal.
UPLOADING YOUR SERVER CODE TO YOUR VIRTUAL MACHINE.
Virtual Machine and UNIX. What is a VM? VM stands for Virtual Machine. It is a software emulation of hardware. By using a VM, you can have the same hardware.
STORAGE SOLUTIONS Research Data Management. Keeping your data just on your working machine, be it lap top or desktop, is the perfect way to loose your.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Chapter 31 File Transfer & Remote File Access (NFS)
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Computation for Physics 計算物理概論 Introduction to Linux.
CSE 390a Editing and Moving Files
1 Web Server Administration Chapter 9 Extending the Web Environment.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
1 Web Server Administration Chapter 9 Extending the Web Environment.
Network Security SSH Tunneling David Funk Matt McLaughlin Systems Administrators Computer Systems Support COE, University of Iowa.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
CPSC 233 Run graphical Java programs remotely on Mac and Windows.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Remote Access Telnet Telnet FTP FTP. 2 Applications and Communications Telnet Telnet  Program for accessing systems remotely.  Available on Windows.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Linux Services Configuration
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Unix Machine In Computer Science for Teaching Cliff Zou Spring 2015.
CITA 310 Section 8 Extending the Web Environment (Textbook Chapter 9)
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
FileZilla An open-source success story. Mark Swelstad – Itec400, Winter 2007.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Day11a FTP. File Transfer Protocol. –Used to move files from one machine to another. Windows -> Unix Unix -> Windows Unix -> Unix Windows -> Windows etc.
Secure services Unit-IV CHAP-1
Ssh: secure shell.
Hillsborough Community College
FTP Lecture supp.
XWN740 X-Windows Configuring and Using Remote Access
FTP - File Transfer Protocol
Web Server Administration
Logging into the linux machines
File Transfer Olivia Irving and Cameron Foss
Telnet/SSH Connecting to Hosts Internet Technology.
FTP and UNIX TOPICS Exploring your Web Hosting Site FTP UNIX
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Downloading workshop files to your computer
Logging into the linux machines
Chapter 7 Network Applications
Presentation transcript:

Remote access and file transfer Getting files on and off Bio-Linux

Overview Remote logins to Bio-Linux Getting data from remote machines Pushing data from Bio-Linux Networked file systems and file-sharing

Logging in remotely There is only 1 way to access a Bio-Linux machine remotely. Bio-Linux runs sshd, which supports Secure Shell connections. Secure Shell (SSH) is a safe version of something like “telnet”. How you access Bio-Linux remotely using SSH depends on what system you are logging in from.

SSH clients by platform Windows: We recommend PuTTY ( It is a free, lightweight and capable SSH client. Mac Classic: MacSSH ( Mac OSX: Built in ssh at the command line Linux/Unix: OpenSSH ( is the Open Source ssh suite. It is installed on Bio- Linux by default.

Working via SSH Configuring a graphical SSH client is very easy You will need a username The IP address and/or hostname of the machine Some clients make you specify the SSH port (22 by default) If you want to use graphical applications over the ssh “tunnel” you will need to enable “X11 forwarding”

Why use X11 forwarding? It means you can log in and run your favourite graphical Bio-Linux applications on your Windows/Mac/Unix desktop. But... I want a full Bio-Linux desktop to work with remotely! Simple: Just log in via SSH with X11 forwarding turned on and type the following command: gnome-session & You will get a full interactive Gnome desktop on your machine! It will be just like being on the Bio-Linux machine (but slightly slower!)

Command line SSH basics Logging into a machine using a non-graphical SSH client is easy: ssh To make sure X forwading is turned on with OpenSSH ssh -x

Getting data from remote machines Most likely you are familiar with FTP. Most people are familiar with graphical FTP clients. Bio-Linux has a command line FTP client. At a terminal just type: ftp You will be prompted for a username and password.

FTP basics ls bin ascii get mget put mput

sFTP If the server supports it you should use sftp instead of FTP. sFTP = secure FTP The rest of the commands are just like FTP Relies on sshd.

SCP scp is the hard way of doing sftp ;) : Can take wildcards. Great for shunting single files around between Linux machines. Relies on sshd.

WinSCP For getting files from Windows to Bio-Linux there is a great (free!) program called WinSCP It looks just like a regular windows file manager. You can “drag and drop” files to and from your Bio-Linux machine. Handles SCP and SFTP transparently

Using networked resources You may have shared drives at your place of work. These may be NOVELL shares – A novell client is available for Linux so you can access these. smbclient : allows you to access Windows Shares NFS : Bio-Linux can be easily set up to receive NFS exports. Ask us for advice on all of these!