Secure Telnet Connection
Telnet is inherently insecure. Credential information (usernames and passwords) submitted through telnet is not encrypted and is therefore vulnerable to identity theft. However, users can establish an Secure Shell connection instead to prevent this type of intrusion.
A Secure Shell connection is used to log onto a remote machine over a network, to execute commands on a remote machine, and to transfer files from one machine to another. Secure Shell replaces telnet, rlogin, rsh, and rcp.
IT officially supports the PuTTY client as the tool of choice for Windows machines for creating a secure remote connection to the University network. PuTTY can be used to establish a connection to UNIX machines on campus as well as the Numerically Intensive Computing machine. PuTTY is also used for creating an X-windows session (graphical UNIX interface).
Mac already has built-in support for Secure Shell. To initiate an Secure Shell connection with the University network through Mac, follow these steps:
- Click Applications, then click Utilities.
- Click on the Terminal icon. This will open a command line window.
- Type: ssh @ (replacing with your username).
- Type your password, and the connection will be completed.
Linux also has built-in support for Secure Shell. To initiate an Secure Shell connection with the university network through Linux, simply open a terminal session, type ssh, and then authenticate using your username and password.
- Unix Server Hostname -- Remotely connect to UNIX computers on the Electrical Computer Engineering, Computer Science, and Numerically Intensive Computing servers via PuTTY, WinSCP, etc.