Etrust Access Control for UNIX Utilities Guide

Total Page:16

File Type:pdf, Size:1020Kb

Etrust Access Control for UNIX Utilities Guide e Trust™ Access Control for UNIX Utilities Guide 5.3 G00153-1E This documentation and related computer software program (hereinafter referred to as the “Documentation”) is for the end user’s informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. (“CA”) at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user’s responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation “as is” without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage. The use of any product referenced in this documentation and this documentation is governed by the end user’s applicable license agreement. The manufacturer of this documentation is Computer Associates International, Inc. Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions. 2003 Computer Associates International, Inc. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Contents Chapter 1: Utilities by Category Categories ................................................................................... 1-1 User Utilities ................................................................................. 1-2 Administrator Utilities ........................................................................ 1-2 Installation Utilities ........................................................................... 1-3 Support Utilities .............................................................................. 1-4 Password Utilities ............................................................................ 1-4 Daemons..................................................................................... 1-4 Chapter 2: Utilities in Detail dbmgr ....................................................................................... 2-1 Creating a Database ....................................................................... 2-1 Generating Reports ....................................................................... 2-3 Creating a Script .......................................................................... 2-5 Copying Data to a Flat File ................................................................. 2-6 Managing a Database...................................................................... 2-9 Backing Up a Database ................................................................... 2-10 Restoring a Database ..................................................................... 2-11 defclass ..................................................................................... 2-11 exporttngdb ................................................................................. 2-12 issec ........................................................................................ 2-12 migopts..................................................................................... 2-13 seagent ..................................................................................... 2-14 seaudit...................................................................................... 2-15 seauxd...................................................................................... 2-25 sebuildla .................................................................................... 2-27 sechkey ..................................................................................... 2-30 Changing the Encryption Key ............................................................. 2-31 Changing the selogrd Daemon Encryption Key ............................................. 2-32 Clearing the selogrd Daemon Encryption Key .............................................. 2-32 Contents iii seclassadm .................................................................................. 2-33 secompas .................................................................................... 2-35 secons....................................................................................... 2-37 secrepsw .................................................................................... 2-46 sedbpchk .................................................................................... 2-46 seerrlog ..................................................................................... 2-48 segrace ...................................................................................... 2-49 segracex ..................................................................................... 2-50 seini ........................................................................................ 2-52 selang ....................................................................................... 2-55 seload ....................................................................................... 2-61 selock ....................................................................................... 2-63 selockcom ................................................................................... 2-68 selogmix .................................................................................... 2-69 selogrcd ..................................................................................... 2-71 selogrd ...................................................................................... 2-73 semsgtool ................................................................................... 2-88 senable ...................................................................................... 2-91 senone ...................................................................................... 2-92 SEOS_load................................................................................... 2-93 SEOS_syscall................................................................................. 2-94 seosd........................................................................................ 2-95 seostngd.................................................................................... 2-101 seoswd ..................................................................................... 2-104 sepass ...................................................................................... 2-106 sepmd...................................................................................... 2-115 Administering Subscribers ............................................................... 2-115 Truncating the Update File ............................................................... 2-117 Dual Control ............................................................................ 2-118 Managing the Policy Model Log File ...................................................... 2-120 Other PMDB Administration ............................................................. 2-121 sepmdadm ................................................................................. 2-122 sepmdd .................................................................................... 2-127 sepropadm ................................................................................. 2-132 sepurgdb ................................................................................... 2-134 sereport .................................................................................... 2-135 seretrust .................................................................................... 2-139 serevu...................................................................................... 2-141 sessfgate.................................................................................... 2-148 sesu........................................................................................ 2-148 sesudo ..................................................................................... 2-150 iv Utilities Guide seuidpgm .................................................................................. 2-155 seversion................................................................................... 2-158 sewhoami .................................................................................. 2-159 uninstall_eTrust ...........................................................................
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • UNIX Workshop Series: Quick-Start Objectives
    Part I UNIX Workshop Series: Quick-Start Objectives Overview – Connecting with ssh Command Window Anatomy Command Structure Command Examples Getting Help Files and Directories Wildcards, Redirection and Pipe Create and edit files Overview Connecting with ssh Open a Terminal program Mac: Applications > Utilities > Terminal ssh –Y [email protected] Linux: In local shell ssh –Y [email protected] Windows: Start Xming and PuTTY Create a saved session for the remote host name centos.css.udel.edu using username Connecting with ssh First time you connect Unix Basics Multi-user Case-sensitive Bash shell, command-line Commands Command Window Anatomy Title bar Click in the title bar to bring the window to the front and make it active. Command Window Anatomy Login banner Appears as the first line of a login shell. Command Window Anatomy Prompts Appears at the beginning of a line and usually ends in $. Command Window Anatomy Command input Place to type commands, which may have options and/or arguments. Command Window Anatomy Command output Place for command response, which may be many lines long. Command Window Anatomy Input cursor Typed text will appear at the cursor location. Command Window Anatomy Scroll Bar Will appear as needed when there are more lines than fit in the window. Command Window Anatomy Resize Handle Use the mouse to change the window size from the default 80x24. Command Structure command [arguments] Commands are made up of the actual command and its arguments. command -options [arguments] The arguments are further broken down into the command options which are single letters prefixed by a “-” and other arguments that identify data for the command.
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • Red Hat Jboss Data Grid 7.2 Data Grid for Openshift
    Red Hat JBoss Data Grid 7.2 Data Grid for OpenShift Developing and deploying Red Hat JBoss Data Grid for OpenShift Last Updated: 2019-06-10 Red Hat JBoss Data Grid 7.2 Data Grid for OpenShift Developing and deploying Red Hat JBoss Data Grid for OpenShift Legal Notice Copyright © 2019 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • EMERSON CENTER: HARDWARE Comp.Chem.20
    EMERSON CENTER: HARDWARE comp.chem.20 ssh –Y [email protected] euch4e.chem.emory.edu Passwd: HOME=/home/chemistry/ch_res/eclab cd spark cd star cd fire $HOME/spark $HOME/star $HOME/fire mkdir USER mkdir USER mkdir USER cd USER cd USER cd USER # Nodes = 36 # Nodes = 36 # Nodes = 16 + 1 GPU # Cores/node = 24 # Cores/node = 24, 16 # Cores/node = 56 + 5000 # Speed = 2.6 GHz # Speed = 2.5 GHz # Speed = 2.6 GHz # Memory = 96 GB # Memory = 80 GB # Memory = 196 GB # Classes = spark24p # Classes = star24p # Classes = fire28p spark12p star16p fire-gpu star8p stars (1 core) spark (or spark.chem.emory.edu) star (or star.chem.emory.edu) fire (or fire.chem.emory.edu) Login the Emerson Center’s Computers From a Unix/MAC/iPad/iPhone terminal ssh -Y [email protected] From PC 1) Download and run PuTTY (www.putty.org) 2) Enable X-forwarding (Connection -> SSH -> Tunnels) 3) Under Session, choose SSH on port 22 4) Type euch4e.chem.emory.edu as host name 5) Click Open A few UNIX commands and vi Editor UNIX Tree Structure: Files and Directories cd - change directory: cd directory_name rm - remove command: rm file_name: also: rmdir, rm –I mv - move comman: mv file_name mkdir - make directory: mkdir directory_name cp - copy command: cp file_name_1 file_name_2 ls - list command VI (View) Command mode and Insert mode vi file_name Type i for insert command Use backspace in order to correct mistake :w :w! or :wq :wq! Write or write and quit :q :q! quit dd n delete o Insert line EMERSON CENTER: Software (Selected List) Electronic Structure MD Simulation & Modeling Gaussian-16, 09 GROMACS-19.1 Molpro-15.1 NAMD-2.6 MOLCAS Rosetta GAMESS Amber-14 TURBOMOLE ORCA VASP-5.2 DFTB+ Graphics & Programming MATLAB 2019 Mathematica 12.0 Gauss View 6 Command file (for LoadLeveler only): #!/bin/ksh # ### # @ error = errcl.log # # @ initialdir = /star/chemistry/eclab/YOUR # @ requirements = (Arch == "R6000") && (OpSys == "AIX53") # @ notify_user = name@euch4e # @ class = star16p # @ group = ch_res # @ queue # INPF= test_inp OUTF= test_out .
    [Show full text]
  • PWD 3000 Cu / Cu-Al
    PWD 3000 Cu / Cu-Al High Precision Holding Devices Cable holding device featuring water flow system Pneumatic Cable Holding Device This special holding device allows high precision cable resistance for determining the Cable Resistance measurements on stranding machines even all main parts of it (the compactor and the cable take up mechanism ) are grounded! on non isolated No necessity for isolating machine parts! Stranding Machines The precision holding device PWD 3000 is used for the determination of the electric resistance per meter of power and medium voltage cables. The measurement is based on the 4-pole method according to Kelvin in order to eliminate the feed line resistances. The measuring current is supplied via pneumatically operated jaws, the measuring voltage picked-up via spring-supported taps, with a distance between the taps of 1000 mm (+/- 0,2mm). The current jaws and thus the current feeding points are arranged at a sufficient distance to the taps in accordance with DIN / IEC to ensure a constant and uniform distribution of the current across the actual measuring distance. The cable section is placed in two inner troughs which are filled with flowing water when the pump is running and are containing the potential bars for picking up the measuring voltage; it is here where the actual measurement takes place at a constant (water- ) temperature. Features The Microohmmeter which is part of the equipment additionally measures the (water-) temperature via a probe, • Holds diameters from 10 mm² to 1200 mm² and converts the previously measured resistance value to 20°C (or e.g. 23°C if wanted).
    [Show full text]
  • Nsight Compute OLCF Webinar
    Nsight Compute OLCF Webinar Felix Schmitt, Mahen Doshi, Jonathan Vincent Nsight Product Family Workflow Nsight Systems - Analyze application algorithms system-wide https://www.olcf.ornl.gov/calendar/nvidia-profiling-tools-nsight-systems/ Start here Nsight Compute - Analyze CUDA kernels Systems Nsight Graphics - Debug/analyze graphics workloads You are here Compute Graphics 2 Nsight Compute 3 Nsight Compute CUDA Kernel profiler Targeted metric sections for various performance aspects Customizable data collection and presentation (tables, charts, …) UI and Command Line Python-based rules for guided analysis (or post-processing) 4 Nsight Compute Detailed memory workload analysis chart and tables 5 Nsight Compute Comparison of results directly within the tool with “Baselines” Supported across kernels, reports, and GPU architectures 6 Nsight Compute Source/PTX/SASS analysis and correlation Source metrics per instruction and aggregated (e.g. PC sampling data) Metric heatmap 7 Nsight Compute Full command line interface (CLI) for data collection and analysis On your workstation Support for remote profiling across machines, platforms (Linux, Windows, …) in UI and CLI 8 Nsight Compute on Summit 9 Loading Module Use nv-nsight-cu-cli command line interface for data collection in batch environments Available as part of the CUDA toolkit $ module load cuda/10.1.243 $ /sw/summit/cuda/10.1.243/nsight-compute/nv-nsight-cu-cli Or as standalone installation (e.g. newer release than CUDA) $ module load nsight-compute/2019.5.0 $ /sw/summit/nsight-compute/2019.5.0/nv-nsight-cu-cli
    [Show full text]
  • Duane's Incredibly Brief Intro to Unix How to Get Help on Unix: Man
    Duane’s Incredibly Brief Intro to Unix Duane’s Ten Ways To Make Your Unix Life More Reasonable How to get help on unix: 0. Walk away from the machine. Don’t waste your time in front of a man <command-name> Get full description of command machine if you’re not making any progress. Print a listing and walk away. man -k <keyword> List commands mentioning keyword in title Make and take a friend with you. Life will be better if you reconsider the situation without the pressure of a computer. Logging in and out: logout Terminate session 1. Read the man pages. exit Terminate current "shell" Realize, if you haven’t already, that you don’t know everything. Learn. ssh <remote host> Login securely to a remote host The world travels about 66,600 miles an hour about our Sun, and the Sun glides gracefully along its own path dragging us along. File manipulation: Hackers have no impact. None. emacs <file> Edit a text file (see "cheat sheet") mv <old> <new> Rename/move <old> file to a <new> name 2. Learn the emacs keystrokes. It will save you when you have to rm <file(s)> Delete file(s) from system use a system whose mouse is not working. Avoid the "arrow keys". Why?... cp <orig> <duplicate> Copy <orig> to file named <duplicate> sftp <remote host> Secure batch file transfers between mach’ns 3. Use emacs keystrokes in the shell. Many cursor manipulation keystrokes scp host:<orig> host:<dup> Securely transfer files between machines from emacs recall history in the "bash" shell: cat <file> Display/catenate file contents to screen ^P = previous command, ^N = next command, more <file> Display file, page by page (but: use less) ^R = search for command from the past by typing a few letters less <file> Display file, page by page (avoid more) ^A = go to beginning of command line head <file> Display the first few lines of a file ^E = go to end of command line tail <file> Display the last few lines of a file ^B = go back one character grep <pattern> <file(s)> Search for/display pattern within file(s) ^F = go forward one character source <file> Read commands from <file> (also: .
    [Show full text]
  • 6. Environmental Variables Appropriate for Monitoring
    6. Environmental variables appropriate for monitoring 6.1. INTRODUCTION Chapter 5 above outlined the three major problem areas considered to be most relevant for early implementation in any global monitoring programme as follows: 1. Potentially adverseclimatic change resulting from human activities 2. Potentially adverse changes in biota and man from contamination by toxic substances,including radionuclides 3. Potentially adversechangesin biologicalproductivity causedby improper land-use (reduced soil fertility, soil erosion, extension of arid zones etc.) We now have to discuss which environmental parameters describe and quantify these problems in a useful way. These can be broadly classified under the followingheadings: la. Physical and chemical data from the atmosphere pertinent to climatic change potential b. Physical and chemical data from air, water, soils and biota pertinent to human health and welfare 2a. Physical, chemical and biological data reflecting the state of human health b. Biologicaldata reflecting the performance of biological systems 6.2. PHYSICAL AND CHEMICAL DATA FROM THE ATMOSPHERE PERTINENTTO GLOBALCLIMATICCHANGE In the previous chapter the important global environmental problems related to climatic change were discussed: increases of carbon dioxide and particulate matter in the atmosphere, changes in global albedo and the earth's surface, changes in cloudiness, production of waste heat, and contamination of the stratosphere. Since this discussionfocuses on climatic changes of global significancethe measurements and observations must be representative of large portions of the atmosphere (background values) and free of local contamination. The atmosphere has few mixing constraints and, therefore, this can be achievedby measurements in remote areas and in the upper atmosphere. Carbon dioxide. Our knowledge of the historical trend of atmospheric carbon dioxide as well as estimates of future concentrations are based primarily on a sole set of continuous observations, which dates only from 1958.
    [Show full text]
  • TIP/Ix Utilities
    TIP/ix Utilities IP-617 December 2014 This edition applies to TIP/ix 2.5 and revision levels of TIP/ix 2.5 until otherwise indicated in a new edition. Publications can be requested from the address given below. Inglenet Business Solutions Inc reserves the right to modify or revise this document without notice. Except where a Software Usage Agreement has been executed, no contractual obligation between Inglenet Business Solutions Inc and the recipient is either expressed or implied. It is agreed and understood that the information contained herein is Proprietary and Confidential and that the recipient shall take all necessary precautions to ensure the confidentiality thereof. If you have a license agreement for TIP Studio or TIP/ix with Inglenet Business Solutions Inc, you may make copies of this documentation for internal use. Otherwise, you may not copy or transmit this document, in whole or in part, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of Inglenet Business Solutions Inc. Inglenet Business Solutions Inc Toll Free: 1-800-387-9391 Website: http://www.Inglenet.com Sales: [email protected] Help Desk: [email protected] TIP Studio, TIP/ix, and TIP/30, and are registered trade marks of Inglenet Business Solutions Inc: This documentation occasionally makes reference to the products of other corporations. These product names may be trade marks, registered or otherwise, or service marks of these corporations. Where this is the case, they are hereby acknowledged as such by Inglenet Business Solutions Inc. © Inglenet Business Solutions Inc, 1990-2014 TIP/ix Utility Programs Contents TIP/ix Utility Programs ................................................
    [Show full text]
  • The AWK Pattern Processing Language
    000.book.fm Page 531 Wednesday, September 30, 2009 10:13 AM 12 The AWK Pattern Processing Language In This Chapter AWK12Chapter12 is a pattern-scanning and processing language that searches one or more files for records (usually lines) that Syntax . 532 match specified patterns. It processes lines by performing Arguments . 532 actions, such as writing the record to standard output or Options . 533 incrementing a counter, each time it finds a match. Unlike procedural languages, AWK is data driven: You describe the Patterns . 534 data you want to work with and tell AWK what to do with Actions. 535 the data once it finds it. Variables . 535 You can use AWK to generate reports or filter text. It works Functions. 536 equally well with numbers and text; when you mix the two, Associative Arrays. 538 AWK usually comes up with the right answer. The authors of AWK (Alfred V. Aho, Peter J. Weinberger, and Brian W. Control Structures . 539 Kernighan) designed the language to be easy to use. To Examples . 541 achieve this end they sacrificed execution speed in the origi- getline: Controlling Input . 558 nal implementation. Coprocess: Two-Way I/O. 560 Getting Input from a Network. 562 Copyright © 2010 Mark G. Sobell 531531 000.book.fm Page 532 Wednesday, September 30, 2009 10:13 AM 532 Chapter 12 The AWK Pattern Processing Language AWK takes many of its constructs from the C programming language. It includes the following features: • A flexible format • Conditional execution • Looping statements • Numeric variables • String variables • Regular expressions • Relational expressions •C’s printf • Coprocess execution (gawk only) • Network data exchange (gawk only) Syntax A gawk command line has the following syntax: gawk [options] [program] [file-list] gawk [options] –f program-file [file-list] The gawk utility takes its input from files you specify on the command line or from standard input.
    [Show full text]
  • Bender Tutorial
    UC Riverside CS/EE 147 Bender Tutorial ♦ Overview In this tutorial, we will learn how to log into the EE server, Bender. Then, we will write and run a basic CUDA application on it. In short, we will do the following: 1. Access a terminal 2. Log into Bender 3. Write a simple CUDA code 4. Compile and run the CUDA code ♦ Access a terminal In order to log into Bender, you will need to access a terminal or SSH client first. You will then use it to connect to Bender via a secure shell protocol (SSH). For Windows, there are several free applications you could use to this end, such as PuTTY, MobaXTerm and Windows Subsystem for Linux (WSL). For Unix-based operating systems, there is already a pre-installed Terminal application. Therefore, you may skip this step if you are using Linux and open the Terminal for the next step. In this tutorial, we will use MobaXTerm due to its ease of use and fast preparation time. 1. Go to this link: https://mobaxterm.mobatek.net/download-home-edition.html 2. You may choose either the portable edition or the installer edition. (The portable edition requires no installation and can be run immediately.) 3. Run MobaXTerm. 4. Click “Start local terminal” in the middle or the “+” on the top (as shown by the red boxes) to open a terminal tab. 1 UC Riverside CS/EE 147 ♦ Login into Bender After opening the terminal, you can now SSH into the Bender machine. 1. Type the following command into the terminal: ssh <ENGR UNAME>@bender.engr.ucr.edu 2.
    [Show full text]