EECS 10: Assignment 1
September 26, 2008
Due Monday 6 Oct 2008 at 12:00pm (noon)
Login to your Unix account
For this class, you will be doing your assignments by
to a shared machine (server) running the Unix
operating system. Even though you may be using a personal computer or a workstation that is capable of computation
locally, you will mainly be using them as
(clients), whose job is to pass keystrokes to the server and display
outputs from the server.
To use a shared machine, first you need an
on the machine. EECS support has created an
student. To retrieve the username and password go to the following website:
The website asks for your UCInetID and the according password before giving you the account information of your
new EECS account. Note that your browser may also ask you to accept a certificate to open the secure website. DO
NOT contact NACS directly. We are NOT using NACS unix machines for EECS 10. If you have a problem please
contact your EECS 10 TA, (email@example.com).
The name of the instructional server is
You can log into your account with your
EECS user name and password. Your account also comes with a certain amount of disk space. You can use this space
to store homework assignment files, and you don’t need to bring your own disks or other storage media.
is down, then you can try another machine, such as
. You can use the same user name and password regardless
of the machine, and your files will be the same.
Software and commands for remote login
You can connect to
from virtually any computer anywhere that has internet access. What
you need is a client program for
Previously, people used
to connect to the server, and
to transfer files. However,
these protocols are insecure, because your keystrokes or output are in clear text and can be
by others. This
means your account name and password can be stolen this way. So, for security reasons, do not use either of these
as the primary way to connect to the server.
, and it encrypts your net-
work communication, so that your data cannot be understood by snoopers. For file transfers, use
are secure. You could also set up an
so that previously unencrypted communications can be encrypted.