This preview has intentionally blurred parts. Sign up to view the full document

View Full Document

Unformatted Document Excerpt

EECS 10: Assignment 1 September 26, 2008 Due Monday 6 Oct 2008 at 12:00pm (noon) 1 Login to your Unix account For this class, you will be doing your assignments by logging on to a shared machine (server) running the Unix operating system. Even though you may be using a personal computer or a workstation that is capable of computation locally, you will mainly be using them as terminals (clients), whose job is to pass keystrokes to the server and display outputs from the server. To use a shared machine, first you need an account on the machine. EECS support has created an account for each student. To retrieve the username and password go to the following website: https://newport.eecs.uci.edu/account.py . The website asks for your UCInetID and the according password before giving you the account information of your new EECS account. Note that your browser may also ask you to accept a certificate to open the secure website. DO NOT contact NACS directly. We are NOT using NACS unix machines for EECS 10. If you have a problem please contact your EECS 10 TA, (eecs10@eecs.uci.edu). The name of the instructional server is malibu.eecs.uci.edu. You can log into your account with your EECS user name and password. Your account also comes with a certain amount of disk space. You can use this space to store homework assignment files, and you dont need to bring your own disks or other storage media. If malibu.eecs.uci.edu is down, then you can try another machine, such as vivian.eecs.uci.edu , newport.eecs.uci.edu , or east.eecs.uci.edu . You can use the same user name and password regardless of the machine, and your files will be the same. 1.1 Software and commands for remote login You can connect to malibu.eecs.uci.edu from virtually any computer anywhere that has internet access. What you need is a client program for remote login . Previously, people used rlogin or telnet to connect to the server, and ftp or rcp to transfer files. However, these protocols are insecure, because your keystrokes or output are in clear text and can be snooped by others. This means your account name and password can be stolen this way. So, for security reasons, do not use either of these programs. Instead, use ssh as the primary way to connect to the server. ssh stands for secure shell , and it encrypts your net- work communication, so that your data cannot be understood by snoopers. For file transfers, use sftp or scp , which are secure. You could also set up an ssh-tunnel so that previously unencrypted communications can be encrypted.so that previously unencrypted communications can be encrypted.... View Full Document

End of Preview

Sign up now to access the rest of the document