|
|
|||
Security and Secure Shell (ssh)A firewall protects the lab computers; for this reason nothing else than ssh connections (scp and sftp fit into that) are allowed from outside the department. Moreover, you can't reach directly your computer from the outside world: you have to go through either anubis, bastet, halfdome, isis, ra or zeep. The Secure Shell (SSH) is becoming the standard for remote logins and file transfer across the Internet. It encrypts all the connections, and provides a high level of protection against hacker attacks. SSH includes secure remote logins, secure file transfers, secure tunneling of X11 traffic, and secure access to e-mail over the Internet. Read the man pages for ssh and scp. Running ssh isis.eecg from a local xterm will login a user into isis.eecg across a secure connection and forward the users X11 parameters. An X11 application can be then started on isis.eecg with no further setup (you may need to use 'ssh -X' to enable X11 forwarding when you establish your connection in the first place). SSH protects against
(from the README):
A good source of information about using and installing SSH on various platforms is located here. Please visit Dan Astoorian's excellent SSH resource page at: http://www.cs.toronto.edu/~djast/ssh.html .
EECG graduate admin |