Coterm Real-time terminal collaboration Like Google Docs for the Shell Matthew R. Laue

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Encrypting Wireless Data with VPN Techniques
TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION  UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
Chapter 17: WEB COMPONENTS
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
OpenSSH: A Telnet Replacement Presented by Aaron Grothe Heimdall Linux, Inc.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
The Blue “W” is placed on your Desktop or in your system tray area.
Chromium OS is an open-source project that aims to build an operating system that provides a fast, simple, and more secure computing experience for people.
PSeries Technical Conference L19 Brian Dolan-Goecke Atlanta, GeorgiaOctober 8-12, 2001 Linux VPN.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Zultys Introduces MXmeeting ™. Introducing MXmeeting™  Overview  Configurations and Scale  4-in-1 Functions (+ Voice Bridging)  How to Sell.
Welcome to Seagull-Servicing Presentation. Important Features Customers can register complaints online – no need to use or phone call Employees.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Honeypot and Intrusion Detection System
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
TeamViewer – Remote Session Control By Phil Goff SIR Branch 116 July 21, 2011.
Leveraging Globus Services to Support Climate Model Data Access Through the Earth System Grid Federation (ESGF) Brian Knosp 1, Luca Cinquini 1, Lukasz.
SSH Operation The Swiss Army Knife of encryption tools…
QuickBooks, Hosted by Reckon Online – Hints & Tips Presented by Cole Atkinson.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Network Security Part III: Security Appliances Firewalls.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Cygwin CMSC 104 UMBC.  CygWin is a collection of free software tools originally developed by Cygnus Solutions to allow various versions of Microsoft.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Unit 3 Computer Systems. What is software? unlike hardware it can’t be physically touched it’s the missing link between the computer hardware and the.
Network customization
3.1 Types of Servers.
Instructor Materials Chapter 5 Providing Network Services
Project 1 Simple Socket Client.
3.1 Types of Servers.
Welcome to Salem State University
3.1 Types of Servers.
Simple Socket Client Project 1.
FTP - File Transfer Protocol
Popular Operating Systems
Aplikasi Jaringan.
Design Unit 26 Design a small or home office network
Simple Socket Client Project 1.
Firewalls Routers, Switches, Hubs VPNs
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Coterm Real-time terminal collaboration Like Google Docs for the Shell Matthew R. Laue

Distributed development turns small problems into large problems My GIT repo is messed up … The build is broken … etc … My GIT repo is messed up … The build is broken … etc … What were your exact steps? Have you tried… What were your exact steps? Have you tried… I don’t know. It doesn’t work. It’s due tomorrow. I don’t know. It doesn’t work. It’s due tomorrow. I’m at home, out of town, outside the firewall, running a different OS… Coterm allows the right person to solve a problem regardless of: Location System configuration Firewall settings “Typing is no substitute for thinking.” - Dartmouth Basic manual, 1964.

Host Participant AParticipant B Coterm Invited participants join a session hosted on a given terminal.

Coterm: features Instant - immediately collaborate on an existing problem – no need to reproduce on a separate system. Fast- quick text-based protocol – no cumbersome graphics transfer. Secure - complete end-to-end encryption. Accessible - works through existing firewall. Easy - basic setup with minimal system requirements.

Coterm: firewalls and security Akiri Solutions’ Secure Connector ™ functions as an application router. Clients open sockets to HTTPS (443) port and the secure connector handles routing. No listening sockets and no changes to firewall means no port attacks. Data is encrypted and decrypted at the client endpoints.

Coterm: how much? COMMERCIAL LICENSE $8 per user per month. OPEN-SOURCE/NON COMMERCIAL FREE

Coterm: how do I try it? 1.Register at the Akiri Solutions website: 2.Verify your address and login. 3.Download coterm for your OS. 4.Run one instance, create a session and invite your own username. 5.Run a second instance – or more! - and join the session you created.

QUESTIONS?

Coterm: alternatives Screen sharing or Online meetings Pros  Full multimedia support.  Large feature set. Cons  Expensive.  Installation required.  System intensive.  Slow. SSH + Screens Pros  It works.  Free. Cons  Difficult to set up.  Poor Windows support.  Firewall issues.

Akiri Solutions, Inc. Based in Palo Alto, CA with offices in Las Vegas, NV and Silicon Valley. Incorporated in Developer products and software consulting. Self-funded. Coterm patent filed : 4/2012.