Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.

Slides:



Advertisements
Similar presentations
Netscape Mail. Starting Out Launch Netscape From the menu bar select Edit - Preferences The next slides show the configuration for the mail preferences.
Advertisements

®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
Chapter One The Essence of UNIX.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCT260-Operating Systems I Operating Systems I Networking.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Guide To UNIX Using Linux Third Edition
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Computer Networks IGCSE ICT Section 4.
hotEx RADIUS Manager Installation
File sharing. Connect the two win 7 systems with LAN card Open the network.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
ADVANCED CONCEPTS IN GOOGLE CALENDAR Advanced Session By Information Technology Services itservices.uncc.edu.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
HOW TO PULL YOUR VOICE MAILS INTO YOUR CLIENT Primary advantage: You will have a permanent.wav file on your PC and you choose when to delete it.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
HCare access on an iPad hCare access is the remote access to PGH. The steps for installing vary from the Mac somewhat. This will guide you. Installation.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Agenda What is Computer Programming? The Programming Process
IT FORUM March 23, 2010 RoyalDrive Tony Gazoo Applications Administrator IT Development & Applications.
LGC Website and Customer On-line Tools LGC RESOURCE 2014.
BIF713 Operating Systems & Project Management Instructor: Murray Saul
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
MagicInfo Pro Server Software All control, content, and scheduling is performed within the MagicInfo Pro Server software previously installed. Before.
Student Financial Assistance. Edconnet SFA to the Internet: EDconnect Software Session 16.
November 2014Prepared by the Computer Lab Montgomery County-Norristown Public Library.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Internet Applications Module G Copyright 2001 Prentice Hall.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
Introduction to WebFX. Summary of Last Lectures n Introduction to computers n Computer hardware and software –computer microcomputer minicomputer mainframe.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CMSC 104, Version 8/061L01Introduction.ppt Introduction CMSC 104 Problem Solving and Computer Programming.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
SAM 2003 The Student Experience. Initial Setup 1.Ensure you are connected to the Internet. 2.Launch IE (v. 5.0 or later). 3.Enter
Network By: Juan F Peñaherrera. Network is. A computer network is a group of computers and devices connected by communication channels.The 3 types of.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CS101 Network Setup. Parts of a network Everything on a network is called a ____ Three main types of _____: –__________ Devices = Printers, Scanners,
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
What is the Internet? A world-wide computer network made up of tens of thousands of smaller networks. It’s the biggest network of all! So, what is a network?
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
UNX122 UNX122_022_w1_p1 Operating Systems - Unix Instructor: DAVID WARD.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
Uploading Files to the Remote Server Using Win_SCP Portable
HOW TO SETUP BELKIN ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
HOW TO SETUP CISCO ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
HOW TO SETUP DLINK ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
office.com/setup installation and Activation
office.com/setup download,installation and Activation support guide
Telnet/SSH Connecting to Hosts Internet Technology.
ICT Computing Lesson 4: Computing Network.
Chapter 7 Network Applications
Presentation transcript:

Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to Change your Password Basic Unix Commands –pwd –ls (Various Options)

Computer Networks Personal computers that are not connected to other computers (via network cards) are referred to as “stand-alone” computers. Institutions such as colleges find it more economical and efficient to connect up personal computers to form a computer network

Computer Network File Server (Central Computer) Terminal (Client)

File Server A file server is a powerful centralized computer system with an operating system that allows multiple users to access software applications and data files. The file server may also provide other important services such as network printer management and connection to other networks (Internet)

Computer Networks Computers connected to form a network over small geographic locations (such as a building or city) are referred to as Local Area Networks (LANs) Local Area Networks can use modems or routers to connect up to other LANs from far distances to form Wide Area Networks (WANs)

Advantages of Computer Networks Economical –Ability to share hardware devices such as printers and scanners Efficient –Ability to communicate among users –Efficient method to maintain and upgrade software (I.e. one copy of software on file server - therefore, only upgrade one location) –Ability for users to share files

Seneca Computer Network Newnham Campus Modem Pool Newnham Campus SIRUS LEARN MERCURY Remote Users Internet Campus T1

Seneca Computer Network Campus Newnham Campus T1 PHOBOS(RS6000) VISION “ CS “ PANDORA LINUX

Relevant Servers LEARN –Used to read and send . Phobos password will be ed to this account PHOBOS –Computer account used for creating, modifying, compiling and executing programs VISION –Used to store and maintain a student webpage. Need to request permission for account

Steps to Logon to PHOBOS Access Sirus from web browser Complete Sirus screen to generate LEARN & PHOBOS accounts Setup / Read in LEARN to obtain PHOBOS account name & password Telnet to Phobos account - Read and record VISION password

Steps to Logon to PHOBOS Logon to SIRIS to create account. Change Learn password. Remember to use your 5 digit PIN number to logon to SIRIS.

Steps to Logon to PHOBOS Setup & access LEARN via Netscape to check to determine your PHOBOS username and password. Logout of LEARN account Logon to PHOBOS account via telnet application. Change password and LOGOUT of PHOBOS account.

Setup Netscape to Access LEARN mail Launch Netscape, point and click onto EDIT menu and point and click onto preferences

Setup Netscape to Access LEARN mail Point and click onto the plus sign to the right of the “Mail & Newsgroups” category: this will expand the selection. Point and click onto Identity

Setup Netscape to Access LEARN mail If you are using Netscape at the Seneca College labs, you will have to type in the following information for every new session: –Your name –Your LEARN address

Setup Netscape to Access LEARN mail Point and click onto “Mail Servers”, and enter the following information: –Mail server user name: type your username –Outgoing mail: type learn.senecac.on.ca –Incoming mail: type learn.senecac.on.ca Make sure that Mail server Type is set to IMAP (Select the option “move deleted messages in trash”) Point and click onto OK

Setup Netscape to Access LEARN mail

How to Read via Netscape Point and click onto the mailbox button: Point and click onto the New Message button to read your

How to Read via Netscape You will required to enter your LEARN password (not the 5 digit number, but actual LEARN password you created in SIRIS) WARNING: –Make sure to close Netscape after reading your messages; otherwise, people can read your and send with your address.

How to Logon to PHOBOS Server Run Telnet Program Type in your Login I.D. Type in your password Note:For first time-users, you must go to Siris, create a learn account, read message in LEARN account via Netscape regarding PHOBOS username & Password

What is the Telnet Application? Unix systems such as PHOBOS were originally designed to accommodate “dumb terminals” which were simply monitors and keyboards directly connected up to network Telnet allows the server to “think” that the user’s personal computer is a “dumb terminal” A common type of “dumb terminal” was Digital Equipment corporation’s VT100.

Telnet Application To launch or “run” the Telnet application from the Seneca computing lab, point and click onto the application “telnet” on the Windows 95 desktop You can obtain a free version of Telnet application for home use (assuming you have computer system with modem). More details in following lessons

Protecting your Computer Accounts It is important to assign an appropriate password to prevent unauthorized access to your computer accounts. Concerns regarding unauthorized use: –Illegal Activity –Suspension of account –Loss of data / Copying of assignments

Password tips Avoid easily detected passwords such as names or a series of numbers. Use phrases and take the first letter of each word For example: Autumn leaves Turn red, yellow, orange

Password Tips Combine upper and lower cash letters Include a non alpha-numeric characters such as. - in your password Acceptable passwords on PHOBOS and LEARN range from 6 to 8 characters

Changing your Password After logging onto PHOBOS, you can change your password by typing at the $ prompt: passwd Note: It is recommended to change password periodically.

Basic Unix Commands Listing Files: lsDisplays compact list of files (excluding hidden files - beginning with period) ls -aDisplays all files (including hidden files) ls -lDisplays detailed list of files (excluding hidden files) ls -alDisplays all files in detail form (including hidden files)

Homework Create an acceptable password using the above-mentioned techniques. Be prepared to change your password in next computer lab.