EECS assignment1

EECS assignment1 - EECS 10 Assignment 1 Due Monday 6 Oct...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
EECS 10: Assignment 1 September 26, 2008 Due Monday 6 Oct 2008 at 12:00pm (noon) 1 Login to your Unix account For this class, you will be doing your assignments by logging on to a shared machine (server) running the Unix operating system. Even though you may be using a personal computer or a workstation that is capable of computation locally, you will mainly be using them as terminals (clients), whose job is to pass keystrokes to the server and display outputs from the server. To use a shared machine, first you need an account on the machine. EECS support has created an account for each student. To retrieve the username and password go to the following website: . The website asks for your UCInetID and the according password before giving you the account information of your new EECS account. Note that your browser may also ask you to accept a certificate to open the secure website. DO NOT contact NACS directly. We are NOT using NACS unix machines for EECS 10. If you have a problem please contact your EECS 10 TA, ([email protected]). The name of the instructional server is You can log into your account with your EECS user name and password. Your account also comes with a certain amount of disk space. You can use this space to store homework assignment files, and you don’t need to bring your own disks or other storage media. If is down, then you can try another machine, such as , , or . You can use the same user name and password regardless of the machine, and your files will be the same. 1.1 Software and commands for remote login You can connect to from virtually any computer anywhere that has internet access. What you need is a client program for remote login . Previously, people used rlogin or telnet to connect to the server, and ftp or rcp to transfer files. However, these protocols are insecure, because your keystrokes or output are in clear text and can be snooped by others. This means your account name and password can be stolen this way. So, for security reasons, do not use either of these programs. Instead, use ssh as the primary way to connect to the server. ssh stands for secure shell , and it encrypts your net- work communication, so that your data cannot be understood by snoopers. For file transfers, use sftp or scp , which are secure. You could also set up an ssh-tunnel so that previously unencrypted communications can be encrypted.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/25/2012 for the course EECS 10 taught by Professor ? during the Fall '08 term at UC Irvine.

Page1 / 5

EECS assignment1 - EECS 10 Assignment 1 Due Monday 6 Oct...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online