Summary
When remotely connecting to another computer or transferring files between computers,you must use encryption. Encryption will protect usernames, passwords, and other sensitive information. This requires the use of secure protocols.
Body
Overview
When remotely connecting to another computer or transferring files between computers,you must use encryption. Encryption will protect usernames, passwords, and other sensitive information. This requires the use of secure protocols:
- Secure Shell (SSH) creates a secure connection when you log in to a remote computer.
- Secure File Transfer Protocol (SFTP) uses SSH and provides a secure way to transfer files between computers.
You must use SSH or SFTP when connecting to the University's Unix Timesharing Service.
Detail
Windows
PuTTY is a program that enables you to establish a secure SSH connection to the Unix Timesharing Service. A program called WinSCP can be used to establish an SFTP connection. Other commercial and open source packages are also available.
Mac
Macs have a built-in SSH client that can be used to access the Unix Timesharing Service. Macs also have a built-in SFTP capability that can be used to access the Unix Timesharing Service. Or you can use an SFTP program called Fetch. Other commercial and open source packages are also available.
Linux
Linux has a built-in SSH client that can be used to access the Unix Timesharing Service. Many Linux systems also include an SFTP client called gFTP. Other commercial and open source packages are also available.
Related Information
Note: Enterprise Network Firewalls, which are required to protect file servers and workstations in University Departments, allow secure protocols on port 22. They block ports that use insecure protocols, including ports 21 and 25. Insecure protocols include rlogin (remote login), TELNET, rcp (remote copy), and ftp (file transfer).