Using SSH, Logging-In to Wasp/Hornet

Total Page:16

File Type:pdf, Size:1020Kb

Using SSH, Logging-In to Wasp/Hornet Using SSH, Logging-In to wasp/hornet wasp/hornet Accounts We will use computers named: wasp hornet The full names for the computers are: wasp.cs.kent.edu hornet.cs.kent.edu You can use either wasp or hornet. Although wasp and hornet are different computers you will have your same files available no matter which you log in to. For convenience we will just say wasp. Each of you has your own account (login) on wasp and hornet. For both wasp and hornet: Use your kent.edu username and password to log in. When you log in to either you will have access to your own files. All commands will work the same on both computers. Using ssh - Windows/Putty An application called a terminal emulator is used to access Unix with a command line interface. For Windows use the PuTTy terminal emulator. PuTTy is available at: PuTTy download To log into wasp (or hornet) do the following: Start the Putty application For the host name enter: wasp.cs.kent.edu A window called a terminal window should appear. When you see login as: Use your kent.edu username Use your kent.edu password You may not see anything when you type your password. This is so no one can see even the number of characters in your password. You should see a prompt where you can now type some Unix/Linux commands. If you are not successful ask your lab instructor for help. Using ssh - Mac Macs have a built-in terminal application, named Terminal, that can be used to login to a remote computer. On a Mac do the following. Start the Terminal application. Open a Finder Window Click on Applications along the left. Look in the Utilities folder Open the Terminal app A window called a terminal window should appear. In the terminal window type the command: ssh [email protected] When prompted: Use your kent.edu username Use your kent.edu password You should see a prompt where you can now type some Unix/Linux commands. If you are not successful ask your lab instructor for help. After Login ... After you are logged-in type the following commands followed by the enter key. date cal who uptime whoami pwd ls Although some of these are somewhat self-explanatory these commands will be discussed in the next set of notes and later notes. The Control Key The control key used for some commands. In documentation the use of the control key is often denoted by the carat character, ^. ^d, or control-d, means hold down the control key while you type the d key. Additional Notes You can do the same as you did above from any computer that has an Internet connection and ssh (you would need PuTTy or another terminal application). Make sure you logout when you are done. To logout type: ^d (control-d) logout You can have more than one ssh window open to wasp/hornet at a time. For practice do the following: Log out and log back in. Open a second window to wasp (or hornet) and log in. Main -- Notes -- Slides.
Recommended publications
  • Fortianalyzer
    Network diagnose fortilogd Device message rate msgrate-device Network Troubleshooting diagnose fortilogd msgrate-type Message rate for each log type execute ping [host] Ping utility execute traceroute [host] Traceroute utility diag sniffer packet <interface> Packet sniffer Disk <filter> <level> <timestamp> Disk / RAID / Virtual Disk config system fortiview settings Resolve IP address to hostname set resolve-ip enable config system locallog disk setting What happens with oldest logs set diskfull nolog / overwrite Logging diagnose system raid [option] RAID information status, hwinfo, alarms Log Forwarding diagnose system disk [option] Disk information info, health, errors, attributes CHEATSHEET config system log-forward edit log-aggregation <id> For virtual machines: provides a list of Forwarding logs to FortiAnalyzer / execute lvm info available disks aggregation-client set mode Syslog / CEF <realtime, execute lvm extend <disk nr.> For virtual machines: Add disk FORTIANALYZER FOR 6.0 aggregation, disable> config system Configure the FortiAnalyzer that receives © BOLL Engineering AG, FortiAnalyzer Cheat Sheet Version 1.1 / 08.02.2019 log-forward-service logs ADOM set accept-aggregation enable ADOM operation Log Backup config system global ADOM settings set adom-status [en/dis] Enable or disable ADOM mode General execute backup logs config system global Set ADOM mode to normal or advanced / Default device information <device name | all> for VDOMs) <ftp | sftp | scp> <server ip> Backup logs to external storage set adom-mode [normal/advanced]
    [Show full text]
  • Introduction to UNIX at MSI June 23, 2015 Presented by Nancy Rowe
    Introduction to UNIX at MSI June 23, 2015 Presented by Nancy Rowe The Minnesota Supercomputing Institute for Advanced Computational Research www.msi.umn.edu/tutorial/ © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Overview • UNIX Overview • Logging into MSI © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Frequently Asked Questions msi.umn.edu > Resources> FAQ Website will be updated soon © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research What’s the difference between Linux and UNIX? The terms can be used interchangeably © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research UNIX • UNIX is the operating system of choice for engineering and scientific workstations • Originally developed in the late 1960s • Unix is flexible, secure and based on open standards • Programs are often designed “to do one simple thing right” • Unix provides ways for interconnecting these simple programs to work together and perform more complex tasks © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Getting Started • MSI account • Service Units required to access MSI HPC systems • Open a terminal while sitting at the machine • A shell provides an interface for the user to interact with the operating system • BASH is the default shell at MSI © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Bastion Host • login.msi.umn.edu • Connect to bastion host before connecting to HPC systems • Cannot run software on bastion host (login.msi.umn.edu) © 2015 Regents of the University of Minnesota.
    [Show full text]
  • Multiview Terminal Emulator User Guide © 2008 by Futuresoft, Inc
    MultiView Terminal Emulator User Guide © 2008 by FutureSoft, Inc. All rights reserved. MultiView User Guide This manual, and the software described in it, is furnished under a license agreement. Information in this document is subject to change without notice and does not represent a commitment on the part of FutureSoft. FutureSoft assumes no responsibility or liability for any errors or inaccuracies that may appear in this manual. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or other wise, without the prior, written per- mission of FutureSoft, Inc. MultiView 2007, MultiView 2000 Server Edition, MultiView 2008 Server Edition, MultiView Catalyst, MultiView License Manager, MultiView DeskTop and Host Support Server are tradenames of FutureSoft, Inc. Edition 1 May 2008 Document #E-MVUG-MV2007-P053108 Last Updated: 102308 FutureSoft, Inc. 12012 Wickchester Lane, Suite 600 Houston, Texas 77079 USA Printed in the USA 1.800.989.8908 [email protected] http://www.futuresoft.com Table of Contents Contents Chapter 1 Introduction Introduction to MultiView 2007 ....................................................................................... 2 Minimum Requirements .................................................................................................. 2 Contacting FutureSoft Support ........................................................................................ 3 Chapter 2 Installation and Configuration Installing MultiView
    [Show full text]
  • AVR244 AVR UART As ANSI Terminal Interface
    AVR244: AVR UART as ANSI Terminal Interface Features 8-bit • Make use of standard terminal software as user interface to your application. • Enables use of a PC keyboard as input and ascii graphic to display status and control Microcontroller information. • Drivers for ANSI/VT100 Terminal Control included. • Interactive menu interface included. Application Note Introduction This application note describes some basic routines to interface the AVR to a terminal window using the UART (hardware or software). The routines use a subset of the ANSI Color Standard to position the cursor and choose text modes and colors. Rou- tines for simple menu handling are also implemented. The routines can be used to implement a human interface through an ordinary termi- nal window, using interactive menus and selections. This is particularly useful for debugging and diagnostics purposes. The routines can be used as a basic interface for implementing more complex terminal user interfaces. To better understand the code, an introduction to ‘escape sequences’ is given below. Escape Sequences The special terminal functions mentioned (e.g. text modes and colors) are selected using ANSI escape sequences. The AVR sends these sequences to the connected terminal, which in turn executes the associated commands. The escape sequences are strings of bytes starting with an escape character (ASCII code 27) followed by a left bracket ('['). The rest of the string decides the specific operation. For instance, the command '1m' selects bold text, and the full escape sequence thus becomes 'ESC[1m'. There must be no spaces between the characters, and the com- mands are case sensitive. The various operations used in this application note are described below.
    [Show full text]
  • Chapter 10 SHELL Substitution and I/O Operations
    Chapter 10 SHELL Substitution and I/O Operations 10.1 Command Substitution Command substitution is the mechanism by which the shell performs a given set of commands and then substitutes their output in the place of the commands. Syntax: The command substitution is performed when a command is given as: `command` When performing command substitution make sure that you are using the backquote, not the single quote character. Example: Command substitution is generally used to assign the output of a command to a variable. Each of the following examples demonstrate command substitution: #!/bin/bash DATE=`date` echo "Date is $DATE" USERS=`who | wc -l` echo "Logged in user are $USERS" UP=`date ; uptime` echo "Uptime is $UP" This will produce following result: Date is Thu Jul 2 03:59:57 MST 2009 Logged in user are 1 Uptime is Thu Jul 2 03:59:57 MST 2009 03:59:57 up 20 days, 14:03, 1 user, load avg: 0.13, 0.07, 0.15 10.2 Shell Input/Output Redirections Most Unix system commands take input from your terminal and send the resulting output back to your terminal. A command normally reads its input from a place called standard input, which happens to be your terminal by default. Similarly, a command normally writes its output to standard output, which is also your terminal by default. Output Redirection: The output from a command normally intended for standard output can be easily diverted to a file instead. This capability is known as output redirection: If the notation > file is appended to any command that normally writes its output to standard output, the output of that command will be written to file instead of your terminal: Check following who command which would redirect complete output of the command in users file.
    [Show full text]
  • The Linux Command Line Presentation to Linux Users of Victoria
    The Linux Command Line Presentation to Linux Users of Victoria Beginners Workshop August 18, 2012 http://levlafayette.com What Is The Command Line? 1.1 A text-based user interface that provides an environment to access the shell, which interfaces with the kernel, which is the lowest abstraction layer to system resources (e.g., processors, i/o). Examples would include CP/M, MS-DOS, various UNIX command line interfaces. 1.2 Linux is the kernel; GNU is a typical suite of commands, utilities, and applications. The Linux kernel may be accessed by many different shells e.g., the original UNIX shell (sh), the TENEX C shell (tcsh), Korn shell (ksh), and explored in this presentation, the Bourne-Again Shell (bash). 1.3 The command line interface can be contrasted with the graphic user interface (GUI). A GUI interface typically consists of window, icon, menu, pointing-device (WIMP) suite, which is popular among casual users. Examples include MS-Windows, or the X- Window system. 1.4 A critical difference worth noting is that in UNIX-derived systems (such as Linux and Mac OS), the GUI interface is an application launched from the command-line interface, whereas with operating systems like contemporary versions of MS-Windows, the GUI is core and the command prompt is a native MS-Windows application. Why Use The Command Line? 2.1 The command line uses significantly less resources to carry out the same task; it requires less processor power, less memory, less hard-disk etc. Thus, it is preferred on systems where performance is considered critical e.g., supercomputers and embedded systems.
    [Show full text]
  • Bash Guide for Beginners
    Bash Guide for Beginners Machtelt Garrels Garrels BVBA <tille wants no spam _at_ garrels dot be> Version 1.11 Last updated 20081227 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book?.................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need?...............................................................................................................................4 9. Conventions used in this
    [Show full text]
  • Multiping Version 3 Product Manual
    MultiPing version 3 Product Manual (c) 2002, 2014 Nessoft, LLC MultiPing (c) 2002, 2014 Nessoft, LLC All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Printed: August 2014 Special thanks to: Publisher All the people who contributed to this documention and to the Nessoft, LLC PingPlotter software. Managing Editor Special recognition to: Pete Ness Pierre Schwab Technical Editor Tom Larrow Jeff Murri Jenna Clara Andrea, D.D., Nina Mele Cam M. Larry M. Contents I Table of Contents Part I Welcome 2 Part II Support / Help 4 Part III Licensing 6 Part IV Getting Started 8 1 Things .t.o.. .d..o.. .w...i.t.h.. .M..u..l.t.i.P...i.n..g.
    [Show full text]
  • Serial (RS-232) Commands
    Serial (RS-232) Commands Chapter 8 Serial (RS-232) Commands Overview The 7330 Controller has two serial port connectors on the rear panel of the controller labeled RS232-1 and RS232-2. Either port can be configured as the Console port, the port that you use to enter commands to the repeater controller and to perform firmware updates. Whichever port is not being used as the Console port can be used as the Auxiliary port. The 7330 Repeater firmware accepts commands on the Console port. This serial port has a dedicated command queue so that commands can be processed without being delayed by user commands from the DTMF decoders. Commands entered via the serial port have the same format as commands entered via DTMF. The Auxiliary port is currently unused. This chapter describes the uses of the Console port, the command formats, sending a text file of commands, managing files in your controller, and configuring the serial ports. 8-1 7330 Chapter 8 Using the Console Port The Console port has a number of different uses and sets of commands depending on what firmware is running in the 7330 Controller. By default, the 7330 Repeater firmware is controlling the radio equipment attached to the controller. Other firmware installed in the controller, called SBOOT, allows you to manage the files stored in the flash memory of the controller. When power is first applied to the controller, the firmware outputs the following message on the Console port: S-COM 7330 Repeater V3.3 This message tells you what firmware is running and it’s version.
    [Show full text]
  • Interfacing the ESP8266 Wireless Terminal Contents 1 Introduction
    Interfacing the ESP8266 Wireless Terminal Ondřej Hruška Katedra měření, FEL ČVUT March 2, 2017 Contents 1 Introduction1 2 Feature overview2 2.1 Terminal implementation........................2 3 Interfacing the terminal3 3.1 UART connection............................3 3.2 Debug port................................4 3.3 Control codes and escape sequences...................4 3.3.1 Escape sequences.........................4 3.3.2 Colors and attributes......................6 3.3.3 Cursor movement.........................6 3.3.4 Clearing commands.......................7 3.3.5 Screen scrolling..........................7 3.3.6 Cursor memory..........................7 3.4 System commands............................7 3.4.1 Query commands.........................8 3.4.2 Changing screen size.......................8 3.4.3 Factory reset...........................8 3.5 User input.................................8 4 WiFi configuration9 5 Useful links 10 1 Introduction The purpose of this document is to present the ESP8266 Wireless Terminal firmware and describe how the module can be interfaced by an external microcontroller. Ondřej Hruška Katedra měření, FEL ČVUT This document is divided into three sections: the first part explains the internal makeup of the module and it’s possibilities, then we move on to the supported control sequences and details of the communication protocol, and in the last part the wireless settings are discussed. 2 Feature overview The module implements a simple, VT100-compatible terminal emulator with a screen of up to 25x80 characters, controlled by ANSI escape sequences for col- ors, cursor movement and screen manipulation. It’s capable of displaying received characters, as well as receiving input from the keyboard or mouse and sending those back over the serial line. The user can access the terminal screen using their web browser thanks to a tiny built-in webserver, after connecting to the module over WiFi.
    [Show full text]
  • Introduction to UNIX Manual
    UNIX Introduction to UNIX Manual Michael Gribskov V2018.3 24 August 2018 1 Contents Connecting to servers ................................................................................................................................... 4 Windows ................................................................................................................................................... 4 MobaXterm (recommended) ................................................................................................................ 4 PUTTY .................................................................................................................................................... 5 OS X/MacOS/Linux .................................................................................................................................... 6 SSH ........................................................................................................................................................ 6 Cyberduck ............................................................................................................................................. 6 Edit server files .................................................................................................................................. 7 Transferring files ............................................................................................................................... 7 Purdue University Specific .......................................................................................................................
    [Show full text]
  • Mac Os Serial Terminal App
    Mac Os Serial Terminal App Panting and acetous Alaa often scag some monoplegia largo or interdict legitimately. Tourist Nikita extemporised or Aryanised some dop quick, however unsectarian Merwin hectograph globularly or emotionalize. Germaine is know-nothing and sodomizes patronizingly as modiolar Osborne bug-outs unconstitutionally and strides churchward. Can choose a usb to dim the app mac os sector will happen, and act as commented source code is anyone else encountered this Tom has a serial communication settings. Advanced Serial Console on Mac and Linux Welcome to. Feel free office helps you verify that makes it takes a terminal app mac os is used for a teacher from swept back. Additionally it is displayed in the system profiler, you can also contains a cursor, you can i make use these two theme with the app mac os is designed to. Internet of Things Intel Developer Zone. Is based on the latest and fully updated RPiOS Buster w Desktop OS. Solved FAS2650 serial port MAC client NetApp Community. Mac Check Ports In four Terminal. A valid serial number Power Script Language PSL Programmers Reference. CoolTerm for Mac Free Download Review Latest Version. Serial Port Drivers and Firmware Upgrade EV West. Osx ssh If you're prompted about adding the address to the heritage of known hosts. This yourself in serial terminal open it however, each device node, i have dozens of your setting that the browser by default in case. 9 Alternatives for the Apple's Mac Terminal App The Mac. So that Terminal icon appears in the Dock under the recent apps do the.
    [Show full text]