Computing at UMBC An Introduction to the UMBC Computing Environment CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan.

Slides:



Advertisements
Similar presentations
Legal Meetings: Extended Instructions on Movica and Screencast.
Advertisements

FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
A crash course in njit’s Afs
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Panorama High School E.G.P./ Training to Put Students’ Grades on the Website Wednesday, September 29,
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Configuring the MagicInfo Pro Display
Module 8: Managing Client Configuration and Connectivity.
Accessing Barney Off- Campus How can I get my H: files when I am not on the GU network? Business 111 Edward Mitchell Fall 2006.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
File Recovery and Forensics
Computing at UMBC An Introduction to the UMBC Computing Environment CMSC 121 Material source based on slides from Eric Eaton.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 23 Shared Folders 1.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Indiana University’s Research File System. What is the IU Research File System? /user1/user2 /collaboration User 1, on campus User 2, somewhere else BACKUP.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Downloading and Installing Autodesk Revit 2016
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
CMSC 104, Version 8/061L01Introduction.ppt Introduction CMSC 104 Problem Solving and Computer Programming.
Aug Introduction CMSC 104 section 301 Problem Solving and Computer Programming Fall 05.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
Creating Programs on UNIX This term you can create programs on UNIX or you can create programs using a C++ compiler on your PC. This set of slides steps.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Logging into the linux machines This series of view charts show how to log into the linux machines from the Windows environment. Machine name IP address.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
How to use WS_FTP A Step by Step Guide to File Transfer.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Introduction to AFS IMSA Intersession 2003 An Overview of AFS Brian Sebby, IMSA ’96 Copyright 2003 by Brian Sebby, Copies of these slides.
CMSC 104, Version 1/021 Introduction CMSC 104 Problem Solving and Computer Programming Summer 2004 Section 6080 Ms. Dawn Block.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
CMSC 104, Version 9/011 Introduction CMSC 104 Problem Solving and Computer Programming Fall 2001.
Computer Literacy BASICS
Logging into the linux machines
Bomgar Remote support software
Introduction CMSC 104 Problem Solving and Computer Programming
Multi-host Internet Access Portal (MIAP) Enhancement Guide
Emmanuel Ormancey - Michel Christaller
Outlook Basics.
Logging into the linux machines
Introduction CMSC 104 Problem Solving and Computer Programming
Introduction CMSC 104 Problem Solving and Computer Programming
Introduction CMSC 104 Problem Solving and Computer Programming
Presentation transcript:

Computing at UMBC An Introduction to the UMBC Computing Environment CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.

Your GL Account GL is short for “General Labs.” Through this account you have access to various computing resources across the campus. GL is short for “General Labs.” Through this account you have access to various computing resources across the campus. Your GL Account gives you access to: Your GL Account gives you access to: Many labs that are maintained by OIT. An listing of these labs can be found at These labs contain an assortment of dual-bootable Windows 2000 / Linux PCs, Macintosh's, and several IRIX machines. Many labs that are maintained by OIT. An listing of these labs can be found at These labs contain an assortment of dual-bootable Windows 2000 / Linux PCs, Macintosh's, and several IRIX machines. You also get remote server access to several UNIX machines... You also get remote server access to several UNIX machines... linux1.gl.umbc.edu, linux2.gl.umbc.edu, linux3.gl.umbc.edu linux1.gl.umbc.edu, linux2.gl.umbc.edu, linux3.gl.umbc.edu irix1.gl.umbc.edu, irix2.gl.umbc.edu irix1.gl.umbc.edu, irix2.gl.umbc.edu solaris.gl.umbc.edu solaris.gl.umbc.edu The username and password on this account are also your username and password for The username and password on this account are also your username and password for Your username is also your name. You get an account automatically when you sign up for a GL account. It is where username is your logon name. Your username is also your name. You get an account automatically when you sign up for a GL account. It is where username is your logon name.

Your Account Can I change my address? Can I change my address? Technically no, but you can create multiple aliases that send mail to In effect, this changes your address. Technically no, but you can create multiple aliases that send mail to In effect, this changes your To set up aliases, follow the instructions at To set up aliases, follow the instructions at You can also set up your to be forwarded to another account if you wish. See for more details. You can also set up your to be forwarded to another account if you wish. See for more details. Sending and Receiving . There are lots of ways to do this! Sending and Receiving . There are lots of ways to do this! Pine - a UNIX, text-based client. Pine - a UNIX, text-based client. Netscape / Mozilla / Outlook - bulky clients, graphical. See Netscape / Mozilla / Outlook - bulky clients, graphical. See Webmail - UMBC's web-based client. It’s fast, easy-to-use, and accessible from anywhere. There is also a webmail tutorial: Webmail - UMBC's web-based client. It’s fast, easy-to-use, and accessible from anywhere. There is also a webmail tutorial: It is strongly suggested that all CS students lean the Pine program. It is very easy to check your mail remotely via ssh, rip in source code, and is very quick and easy to use (well, once you get used to it). We strongly feel that it is so important that a whole class will be dedicated to Pine and Pico. It is strongly suggested that all CS students lean the Pine program. It is very easy to check your mail remotely via ssh, rip in source code, and is very quick and easy to use (well, once you get used to it). We strongly feel that it is so important that a whole class will be dedicated to Pine and Pico.

The Andrew File System (AFS) AFS is distributed network file system. AFS is distributed network file system. A file system is simply a collection of files and directories assembled in such an order that the make sense to the operating system. A file system is simply a collection of files and directories assembled in such an order that the make sense to the operating system. AFS is a way of keeping track of your files over the network. AFS is a way of keeping track of your files over the network. Features Features You can access your files using any computer that has an AFS client installed on it. You can access your files using any computer that has an AFS client installed on it. All of the lab computers: Windows, Linux, IRIX, and Mac, are capable of reading this file system. All of the lab computers: Windows, Linux, IRIX, and Mac, are capable of reading this file system. The files that you maintain in your account will be accessible to you over the network from any of these computers. No need to store your information on a flash drive and carry it between machines. The files that you maintain in your account will be accessible to you over the network from any of these computers. No need to store your information on a flash drive and carry it between machines.

Your Directory on AFS Every GL account is assigned a directory on AFS, which contains the home directory, web space, and e- mail folders. On all of the UNIX systems here at UMBC it will be located at the following location: Every GL account is assigned a directory on AFS, which contains the home directory, web space, and e- mail folders. On all of the UNIX systems here at UMBC it will be located at the following location:/afs/umbc.edu/users/u/s/username/ u is the first letter of your username, u is the first letter of your username, s is the second letter of your username, s is the second letter of your username, and username is your GL account logon name. and username is your GL account logon name.

Contents of Your AFS Directory These are the folders that are in your account at the time of creation These are the folders that are in your account at the time of creation home - your UNIX home directory. home - your UNIX home directory. Mail - this is where all of your files are kept. Mail - this is where all of your files are kept. pub - this is where public data can be placed, including web space. pub - this is where public data can be placed, including web space. backup - this is a backup copy of your /afs/umbc.edu/users/u/s/username/, updated nightly. backup - this is a backup copy of your /afs/umbc.edu/users/u/s/username/, updated nightly. Within the home directory: Within the home directory: All of the typical files found in any UNIX environment (.cshrc,.login, etc...) All of the typical files found in any UNIX environment (.cshrc,.login, etc...) Windows NT and 2000 Profiles (.2kprofile and.ntprofile directories) Windows NT and 2000 Profiles (.2kprofile and.ntprofile directories) Your files! Your files! Within the Mail directory: Within the Mail directory: files for all of your mailboxes (inbox, sent-mail, etc...) files for all of your mailboxes (inbox, sent-mail, etc...) certain configuration files (such as.forward,.procmailrc, etc...) that allow you to manipulate your mail. certain configuration files (such as.forward,.procmailrc, etc...) that allow you to manipulate your mail. For example, forwarding you mail to another account, or filtering your incoming . For example, forwarding you mail to another account, or filtering your incoming .

Contents of Your AFS Directory Within the pub directory: Within the pub directory: it is empty by default! it is empty by default! This is where you can put files, so that others can readily copy them from here into their accounts. This is where you can put files, so that others can readily copy them from here into their accounts. You can also have a www directory within your pub directory that allows you to post files onto the Internet, accessible via You can also have a www directory within your pub directory that allows you to post files onto the Internet, accessible via The backup directory… The backup directory… …is a copy of your entire account, that is read-only and taken from the night before. This is typically done around midnight. …is a copy of your entire account, that is read-only and taken from the night before. This is typically done around midnight. If you were to accidentally delete a file (or screw up a source code file so it no longer compiles) that you had around yesterday you can go into this directory and you will be presented with the home, Mail & pub directories from the day before. You can then simply copy the file from here to wherever you want. If you were to accidentally delete a file (or screw up a source code file so it no longer compiles) that you had around yesterday you can go into this directory and you will be presented with the home, Mail & pub directories from the day before. You can then simply copy the file from here to wherever you want.

Getting to Your Files You should usually save files to your home directory (/afs/umbc.edu/users/u/s/username/home/). How you access your home directory depends on the operating system… You should usually save files to your home directory (/afs/umbc.edu/users/u/s/username/home/). How you access your home directory depends on the operating system… UNIX / Linux - your home directory is available to you under the /afs/umbc.edu/users/u/s/username/home/ directory. Almost all UNIX shells will start you out in this directory by default. UNIX / Linux - your home directory is available to you under the /afs/umbc.edu/users/u/s/username/home/ directory. Almost all UNIX shells will start you out in this directory by default. Windows Windows Your directory (/afs/umbc.edu/users/u/s/username/) is mapped as the network drive "T:" on the Windows PCs. Your directory (/afs/umbc.edu/users/u/s/username/) is mapped as the network drive "T:" on the Windows PCs. Your home directory (/afs/umbc.edu/users/u/s/username/home/) is mapped as the network drive "S:". Your home directory (/afs/umbc.edu/users/u/s/username/home/) is mapped as the network drive "S:". If you have a www directory in your pub directory (/afs/umbc.edu/users/u/s/username/pub/www/), it is mapped as the network drive "W:". If you have a www directory in your pub directory (/afs/umbc.edu/users/u/s/username/pub/www/), it is mapped as the network drive "W:".

Changing Your Password Via the Web Via the Web Logon to click on the Personal tab, then click on Change my Password. Logon to click on the Personal tab, then click on Change my Password. Follow the on-screen instructions for changing your password (there are several steps). Follow the on-screen instructions for changing your password (there are several steps). Via the UNIX Command Prompt Via the UNIX Command Prompt The standard way to change your password on most all UNIX systems is through a text-based shell. The standard way to change your password on most all UNIX systems is through a text-based shell. To change your password this way, you will need to have shell or terminal access to one of the GL UNIX machines. This can be in the form of a shell on one of the dual-boot lab machines, or by way of remote SSH access. To change your password this way, you will need to have shell or terminal access to one of the GL UNIX machines. This can be in the form of a shell on one of the dual-boot lab machines, or by way of remote SSH access. Once you have your shell open, type passwd at the command prompt. Once you have your shell open, type passwd at the command prompt.

Changing Your Password Note that when you type your password, it will not be echoed to the screen, not even asterisks (*). Note that when you type your password, it will not be echoed to the screen, not even asterisks (*). Windows? Windows? You may be inclined to change your password by pressing Ctrl-Alt- Delete and choosing the "Change Password" option. You may be inclined to change your password by pressing Ctrl-Alt- Delete and choosing the "Change Password" option. But this has been disabled here in the GL labs at UMBC. But this has been disabled here in the GL labs at UMBC. linux1-(11:23am): passwd passwd: Changing password for Old password: New password: New password (again): Kerberos password changed. linux1-(11:24am):

If Someone Knows Your Password Change it NOW!!! Change it NOW!!! Your GL password is just that - yours and only yours. You should not share it with anyone. Your GL password is just that - yours and only yours. You should not share it with anyone. If you think someone knows your password. Here is what you should do... If you think someone knows your password. Here is what you should do... Change your password immediately. Change your password immediately. Report this incident to OIT keeps a log of all activities in all UNIX accounts. Any unauthorized access can be tracked given ample research time. Report this incident to OIT keeps a log of all activities in all UNIX accounts. Any unauthorized access can be tracked given ample research time. You are legally liable for any action caused under your account. You are legally liable for any action caused under your account.

Choosing a Good Password OIT has suggested the following guidelines for choosing a good password... OIT has suggested the following guidelines for choosing a good password... Passwords should contain at least: Passwords should contain at least: 7-14 characters 7-14 characters 2 numbers or symbols in the first 8 characters 2 numbers or symbols in the first 8 characters 5 different characters (letters, numbers, symbols) 5 different characters (letters, numbers, symbols) Passwords should not contain: Passwords should not contain: The at sign ), the number sign ( # ), or the ampersand ( & ) The at sign ), the number sign ( # ), or the ampersand ( & ) Doubled numbers or symbols (e.g., 99 or % ) Doubled numbers or symbols (e.g., 99 or % ) Any words or names spelled forwards, backwards, or in a foreign language Any words or names spelled forwards, backwards, or in a foreign language A Social Security number in the first nine characters of the password A Social Security number in the first nine characters of the password Words constructed with similar-looking number substitutions (e.g., 0 for O ; $ for S ; 1 for i ), for example: capta1nk1rk, mr5p0ck Words constructed with similar-looking number substitutions (e.g., 0 for O ; $ for S ; 1 for i ), for example: capta1nk1rk, mr5p0ck Note: Passwords are case sensitive. The lowercase ‘c’ is a different letter from the uppercase ‘C’. Make sure that the Caps Lock key is not on, unless you intend to enter all uppercase letters. Note: Passwords are case sensitive. The lowercase ‘c’ is a different letter from the uppercase ‘C’. Make sure that the Caps Lock key is not on, unless you intend to enter all uppercase letters. If you forget your password, the OIT helpdesk can reset it for you. If you forget your password, the OIT helpdesk can reset it for you.

Your Quota Every student on the GL network has a set disk quota. This is the amount of space given to most students is 25 MB. That is not a lot of storage space! So, some effort must be made on your part not to exceed this disk quota. Every student on the GL network has a set disk quota. This is the amount of space given to most students is 25 MB. That is not a lot of storage space! So, some effort must be made on your part not to exceed this disk quota. Everything that you store in your directory (/afs/umbc.edu/users/u/s/username/) counts towards this 25 MB limit with the exception of your backup directory, which not figured into how much space you are using. Everything that you store in your directory (/afs/umbc.edu/users/u/s/username/) counts towards this 25 MB limit with the exception of your backup directory, which not figured into how much space you are using. Exceeding your disk quota can cause any number of problems: Exceeding your disk quota can cause any number of problems: Lost messages Lost messages Inability to compile programs Inability to compile programs Abnormal account behavior Abnormal account behavior To check your usage and overall quota, type quota -v in a UNIX shell. If you are exceeding your quota, change your browser settings so they cache little (or nothing at all) to disk. You may then have to manually delete the cached files. If you need help with this, see an OIT Help Desk consultant. To check your usage and overall quota, type quota -v in a UNIX shell. If you are exceeding your quota, change your browser settings so they cache little (or nothing at all) to disk. You may then have to manually delete the cached files. If you need help with this, see an OIT Help Desk consultant. For more information on how to check your quota, see For more information on how to check your quota, see

Checking Your Quota Type in the quota -v UNIX command at the command line. Type in the quota -v UNIX command at the command line. Your output should look something like: Your output should look something like: Doin’ just fine. Doin’ just fine. Nearing the limit. Nearing the limit. Over the limit. Danger zone. Over the limit. Danger zone. linux1-(12:20pm): quota –v Volume NameQuotaUsed%UsedPartition user.dhood %<<64%<<WARNING linux1-(12:20pm): quota –v Volume NameQuotaUsed%Used Partition user.dhood %<< 64% <<WARNING linux1-(12:20pm): quota –v Volume NameQuotaUsed%UsedPartition user.dhood % 64%

How to Get Back Under Quota OIT has made available a tool that goes through your account and tries to eliminate unnecessary files and very large files that may be putting you over the limit. OIT has made available a tool that goes through your account and tries to eliminate unnecessary files and very large files that may be putting you over the limit. You can issue the oitcleaner command... You can issue the oitcleaner command... Note: that the latter part of this script tries to remove larger files that are in your account. You have to answer "y" or "n" whether or not you want to remove these files. Note: that the latter part of this script tries to remove larger files that are in your account. You have to answer "y" or "n" whether or not you want to remove these files. You can also make sure that you have set up the web browser to cache as little as possible to disk. You can also make sure that you have set up the web browser to cache as little as possible to disk.

Restoring a Lost File Remember the backup directory only contains a copy of all of your files from the night before. Remember the backup directory only contains a copy of all of your files from the night before. If you need to restore a file that you deleted days ago, or just minutes ago (assuming minutes ago was still today), then you are not going to find the file here. If you need to restore a file that you deleted days ago, or just minutes ago (assuming minutes ago was still today), then you are not going to find the file here. If it is really important and it was in your account overnight for at least one of these backups, than you may be able to have OIT see if they can recover the file for you. If it is really important and it was in your account overnight for at least one of these backups, than you may be able to have OIT see if they can recover the file for you. Note that this is only done in the rarest and most dire circumstances. Note that this is only done in the rarest and most dire circumstances. In-class demo of recovering a file, both graphically and from the console. In-class demo of recovering a file, both graphically and from the console.

The Outlaws: Telnet and FTP Telnet and FTP refer to basic network utilities (and related protocols) that allows a user to interact with a remote host using a text-based virtual terminal. Telnet and FTP refer to basic network utilities (and related protocols) that allows a user to interact with a remote host using a text-based virtual terminal. Telnet and FTP are both widespread (they are integrated into many operating systems) and useful. Telnet and FTP are both widespread (they are integrated into many operating systems) and useful. You may have telnetted from your home Windows PC to a UMBC Unix server to check your with Pine, or transferred files between 2 computers using FTP. You may have telnetted from your home Windows PC to a UMBC Unix server to check your with Pine, or transferred files between 2 computers using FTP. What is wrong with them? What is wrong with them? Telnet and FTP are inherently insecure. Telnet and FTP are inherently insecure. When you initiate a telnet or FTP connection, your username, password and other bits of important information are broadcast in cleartext, meaning that they are visible to anyone located between your computer and the intended server destination. When you initiate a telnet or FTP connection, your username, password and other bits of important information are broadcast in cleartext, meaning that they are visible to anyone located between your computer and the intended server destination. For example, any curious person with a b-equipped laptop, a packet sniffer program (designed to intercept and interpret data broadcast across a network), and a rudimentary grasp of networking could sit within range of UMBC's wireless networks and grab any usernames and passwords transmitted in cleartext. For example, any curious person with a b-equipped laptop, a packet sniffer program (designed to intercept and interpret data broadcast across a network), and a rudimentary grasp of networking could sit within range of UMBC's wireless networks and grab any usernames and passwords transmitted in cleartext. Regardless of where and how you're online, if you use telnet or FTP, you're putting your vital data at risk. Regardless of where and how you're online, if you use telnet or FTP, you're putting your vital data at risk. Because of the vulnerabilities associated with telnet, UMBC's Office of Information Technology (OIT) prohibited telnet connections to UMBC servers beginning in January Because of the vulnerabilities associated with telnet, UMBC's Office of Information Technology (OIT) prohibited telnet connections to UMBC servers beginning in January 2003.

SSH (instead of Telnet) SSH stands for Secure SHell. SSH stands for Secure SHell. It provides terminal or shell access to some remote computer. It provides terminal or shell access to some remote computer. SSH can be viewed as nothing more than a secure version of telnet. SSH can be viewed as nothing more than a secure version of telnet. There are several SSH clients to choose from. Some are installed in the OIT labs, some you can install, and others require administrator privileges that you may not have under Windows (at least in the labs). There are several SSH clients to choose from. Some are installed in the OIT labs, some you can install, and others require administrator privileges that you may not have under Windows (at least in the labs). Tera Term Pro (available in the UMBC labs) Tera Term Pro (available in the UMBC labs) Putty: Putty:

SCP (instead of FTP) SCP stands for Secure CoPy. SCP stands for Secure CoPy. It provides the functionality of a File Transfer Protocol (FTP) client. It provides the functionality of a File Transfer Protocol (FTP) client. SCP can be viewed as nothing more than a secure version of FTP. SCP can be viewed as nothing more than a secure version of FTP. Again there are many SCP clients out there: Again there are many SCP clients out there: WinSCP (available in the labs): WinSCP (available in the labs): The Linux command: The Linux command: scp localfile

Open AFS AFS is a distributed file system, pioneered at Carnegie Mellon University and supported and developed as a product by Transarc Corporation (now IBM Pittsburgh Labs). It offers a client-server architecture for file sharing, providing location independence, scalability and transparent migration capabilities for data. AFS is a distributed file system, pioneered at Carnegie Mellon University and supported and developed as a product by Transarc Corporation (now IBM Pittsburgh Labs). It offers a client-server architecture for file sharing, providing location independence, scalability and transparent migration capabilities for data. IBM branched the source of the AFS product, and made a copy of the source available for community development and maintenance. They called the release OpenAFS. IBM branched the source of the AFS product, and made a copy of the source available for community development and maintenance. They called the release OpenAFS.OpenAFS Mounting your UMBC AFS Directory at Home Mounting your UMBC AFS Directory at Home Download and install the windows Open AFS client. During installation you will be prompted for an AFS cell name, you should enter umbc.edu Download and install the windows Open AFS client. During installation you will be prompted for an AFS cell name, you should enter umbc.edu When the installation is complete, you will need to reboot. After you reboot, there will be an icon that looks like a lock in the system tray. Click on this to launch the OpenAFS dialog. When the installation is complete, you will need to reboot. After you reboot, there will be an icon that looks like a lock in the system tray. Click on this to launch the OpenAFS dialog. Under the Tokens tab, click Obtain New Tokens... Under the Tokens tab, click Obtain New Tokens... Be sure that the cell name is umbc.edu and go ahead and enter your username and password, then press enter. If everything went ok, you should see an entry under tokens with your GL username. Be sure that the cell name is umbc.edu and go ahead and enter your username and password, then press enter. If everything went ok, you should see an entry under tokens with your GL username. Under the Drive Letters tab, click Add... Under the Drive Letters tab, click Add... Chose an unused drive letter, and enter the path to your root directory on GL (/afs/umbc.edu/users/u/s/username/), and click enter. If everything went ok, then you should see the drive letter added under the OpenAFS dialog. Chose an unused drive letter, and enter the path to your root directory on GL (/afs/umbc.edu/users/u/s/username/), and click enter. If everything went ok, then you should see the drive letter added under the OpenAFS dialog. You should now be able to browse the drive in Windows Explorer. You should now be able to browse the drive in Windows Explorer.