<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Sweenet&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Sweenet&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Sweenet"/>
		<updated>2026-04-09T02:57:23Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T23:53:42Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|WinSCP New Screen]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
SCP is a way to securely copy files. It is a part of the SSH protocol. The SCP command can be invoked at the command line, but there are easier methods. WinSCP provides an easy to use GUI to the SCP file copy protocol.&lt;br /&gt;
&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Puttytunnel.png|thumb|PuTTY Tunnel Settings]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Firefoxproxy.png|thumb|Firefox Proxy Settings]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to a port on the server machine. This allows the client to access services and daemons on the server that are not exposed to the internet. The traffic is sent to the port of the SSH server, decrypted by the server and then forwarded to the port requested by the client. One useful application of this is providing remote access to a Squid proxy server through Windows.&lt;br /&gt;
&lt;br /&gt;
# Set up the squid proxy on the server machine. Make a note of the port that the server is running on. (The default is 3128)&lt;br /&gt;
# Get PuTTY on the client machine and set up a session with the host.&lt;br /&gt;
# Go to the Connection &amp;gt; SSH &amp;gt; Tunnels screen in PuTTY.&lt;br /&gt;
# Add a tunnel from local port 3128 (source port) to port 3128 on the server (destination).&lt;br /&gt;
# Save these settings and connect to the server.&lt;br /&gt;
# Set up the proxy in Firefox by going to Tools &amp;gt; Options &amp;gt; Advanced &amp;gt; Network and click on Settings.&lt;br /&gt;
# Set the radio button to Manual Proxy Configuration and type localhost in the HTTP Proxy field and 3128 in the port.&lt;br /&gt;
&lt;br /&gt;
[[Image:sshtunnel.jpg|left|500px|thumb|SSH Tunnel]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:PuttyX11.png|thumb|PuTTY X11 Settings]]&lt;br /&gt;
|}&lt;br /&gt;
# Set up the SSH server to allow X11 forwarding by making sure the option:&amp;lt;BR&amp;gt;&amp;lt;code&amp;gt;X11Forwarding yes&amp;lt;/code&amp;gt;&amp;lt;BR&amp;gt;is set in /etc/ssh/sshd_config&lt;br /&gt;
# Install Xming and PuTTY on the client machine.&lt;br /&gt;
# Set up Xming to listen on 0.0&lt;br /&gt;
# Set up PuTTY to forward X11 by going to Connection &amp;gt; SSH &amp;gt; X11, selecting the &amp;quot;Enable X11 Forwarding&amp;quot; checkbox and typing &amp;quot;localhost:0.0&amp;quot; into the &amp;quot;X display location&amp;quot; box.&lt;br /&gt;
# Connect to the SSH server and test it out by typing &amp;quot;xclock &amp;amp;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[Secure File Transfer Protocols]]&lt;br /&gt;
* [[SSH Tunneling]]&lt;br /&gt;
* [[The X Windowing System]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
*[http://solaris.reys.net/english/2006/04/x11_forwarding More on X11 Forwarding]&lt;br /&gt;
*[http://www.ssh.com/support/documentation/online/ssh/winhelp/32/Tunneling_Explained.html SSH Tunneling Explained]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;br /&gt;
*[http://www.xk72.com/midpssh/ MidpSSH] - An SSH client for mobile devices&lt;br /&gt;
&lt;br /&gt;
--[[User:Sweenet|Sweenet]] 19:53, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T23:47:14Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|WinSCP New Screen]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
SCP is a way to securely copy files. It is a part of the SSH protocol. The SCP command can be invoked at the command line, but there are easier methods. WinSCP provides an easy to use GUI to the SCP file copy protocol.&lt;br /&gt;
&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Puttytunnel.png|thumb|PuTTY Tunnel Settings]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Firefoxproxy.png|thumb|Firefox Proxy Settings]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to a port on the server machine. This allows the client to access services and daemons on the server that are not exposed to the internet. The traffic is sent to the port of the SSH server, decrypted by the server and then forwarded to the port requested by the client. One useful application of this is providing remote access to a Squid proxy server through Windows.&lt;br /&gt;
&lt;br /&gt;
# Set up the squid proxy on the server machine. Make a note of the port that the server is running on. (The default is 3128)&lt;br /&gt;
# Get PuTTY on the client machine and set up a session with the host.&lt;br /&gt;
# Go to the Connection &amp;gt; SSH &amp;gt; Tunnels screen in PuTTY.&lt;br /&gt;
# Add a tunnel from local port 3128 (source port) to port 3128 on the server (destination).&lt;br /&gt;
# Save these settings and connect to the server.&lt;br /&gt;
# Set up the proxy in Firefox by going to Tools &amp;gt; Options &amp;gt; Advanced &amp;gt; Network and click on Settings.&lt;br /&gt;
# Set the radio button to Manual Proxy Configuration and type localhost in the HTTP Proxy field and 3128 in the port.&lt;br /&gt;
&lt;br /&gt;
[[Image:sshtunnel.jpg|left|500px|thumb|SSH Tunnel]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:PuttyX11.png|thumb|PuTTY X11 Settings]]&lt;br /&gt;
|}&lt;br /&gt;
# Set up the SSH server to allow X11 forwarding by making sure the option:&amp;lt;BR&amp;gt;&amp;lt;code&amp;gt;X11Forwarding yes&amp;lt;/code&amp;gt;&amp;lt;BR&amp;gt;is set in /etc/ssh/sshd_config&lt;br /&gt;
# Install Xming and PuTTY on the client machine.&lt;br /&gt;
# Set up Xming to listen on 0.0&lt;br /&gt;
# Set up PuTTY to forward X11 by going to Connection &amp;gt; SSH &amp;gt; X11, selecting the &amp;quot;Enable X11 Forwarding&amp;quot; checkbox and typing &amp;quot;localhost:0.0&amp;quot; into the &amp;quot;X display location&amp;quot; box.&lt;br /&gt;
# Connect to the SSH server and test it out by typing &amp;quot;xclock &amp;amp;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[Secure File Transfer Protocols]]&lt;br /&gt;
* [[SSH Tunneling]]&lt;br /&gt;
* [[The X Windowing System]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
*[http://solaris.reys.net/english/2006/04/x11_forwarding More on X11 Forwarding]&lt;br /&gt;
*[http://www.ssh.com/support/documentation/online/ssh/winhelp/32/Tunneling_Explained.html SSH Tunneling Explained]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;br /&gt;
*[http://www.xk72.com/midpssh/ MidpSSH] - An SSH client for mobile devices&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:PuttyX11.png</id>
		<title>File:PuttyX11.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:PuttyX11.png"/>
				<updated>2008-04-13T23:46:38Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T23:46:03Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|WinSCP New Screen]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
SCP is a way to securely copy files. It is a part of the SSH protocol. The SCP command can be invoked at the command line, but there are easier methods. WinSCP provides an easy to use GUI to the SCP file copy protocol.&lt;br /&gt;
&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Puttytunnel.png|thumb|PuTTY Tunnel Settings]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Firefoxproxy.png|thumb|Firefox Proxy Settings]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to a port on the server machine. This allows the client to access services and daemons on the server that are not exposed to the internet. The traffic is sent to the port of the SSH server, decrypted by the server and then forwarded to the port requested by the client. One useful application of this is providing remote access to a Squid proxy server through Windows.&lt;br /&gt;
&lt;br /&gt;
# Set up the squid proxy on the server machine. Make a note of the port that the server is running on. (The default is 3128)&lt;br /&gt;
# Get PuTTY on the client machine and set up a session with the host.&lt;br /&gt;
# Go to the Connection &amp;gt; SSH &amp;gt; Tunnels screen in PuTTY.&lt;br /&gt;
# Add a tunnel from local port 3128 (source port) to port 3128 on the server (destination).&lt;br /&gt;
# Save these settings and connect to the server.&lt;br /&gt;
# Set up the proxy in Firefox by going to Tools &amp;gt; Options &amp;gt; Advanced &amp;gt; Network and click on Settings.&lt;br /&gt;
# Set the radio button to Manual Proxy Configuration and type localhost in the HTTP Proxy field and 3128 in the port.&lt;br /&gt;
&lt;br /&gt;
[[Image:sshtunnel.jpg|left|500px|thumb|SSH Tunnel]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
# Set up the SSH server to allow X11 forwarding by making sure the option:&amp;lt;BR&amp;gt;&amp;lt;code&amp;gt;X11Forwarding yes&amp;lt;/code&amp;gt;&amp;lt;BR&amp;gt;is set in /etc/ssh/sshd_config&lt;br /&gt;
# Install Xming and PuTTY on the client machine.&lt;br /&gt;
# Set up Xming to listen on 0.0&lt;br /&gt;
# Set up PuTTY to forward X11 by going to Connection &amp;gt; SSH &amp;gt; X11, selecting the &amp;quot;Enable X11 Forwarding&amp;quot; checkbox and typing &amp;quot;localhost:0.0&amp;quot; into the &amp;quot;X display location&amp;quot; box.&lt;br /&gt;
# Connect to the SSH server and test it out by typing &amp;quot;xclock &amp;amp;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[Secure File Transfer Protocols]]&lt;br /&gt;
* [[SSH Tunneling]]&lt;br /&gt;
* [[The X Windowing System]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
*[http://solaris.reys.net/english/2006/04/x11_forwarding More on X11 Forwarding]&lt;br /&gt;
*[http://www.ssh.com/support/documentation/online/ssh/winhelp/32/Tunneling_Explained.html SSH Tunneling Explained]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;br /&gt;
*[http://www.xk72.com/midpssh/ MidpSSH] - An SSH client for mobile devices&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Firefoxproxy.png</id>
		<title>File:Firefoxproxy.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Firefoxproxy.png"/>
				<updated>2008-04-13T23:20:30Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Puttytunnel.png</id>
		<title>File:Puttytunnel.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Puttytunnel.png"/>
				<updated>2008-04-13T23:20:22Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T23:20:12Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|WinSCP New Screen]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
SCP is a way to securely copy files. It is a part of the SSH protocol. The SCP command can be invoked at the command line, but there are easier methods. WinSCP provides an easy to use GUI to the SCP file copy protocol.&lt;br /&gt;
&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|center|500px|thumb|SSH Tunnel]]&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|PuTTY Tunnel Settings]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|Firefox Proxy Settings]]&lt;br /&gt;
|}&lt;br /&gt;
One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to a port on the server machine. This allows the client to access services and daemons on the server that are not exposed to the internet. The traffic is sent to the port of the SSH server, decrypted by the server and then forwarded to the port requested by the client. One useful application of this is providing remote access to a Squid proxy server through Windows.&lt;br /&gt;
&lt;br /&gt;
# Set up the squid proxy on the server machine. Make a note of the port that the server is running on. (The default is 3128)&lt;br /&gt;
# Get PuTTY on the client machine and set up a session with the host.&lt;br /&gt;
# Go to the Connection &amp;gt; SSH &amp;gt; Tunnels screen in PuTTY.&lt;br /&gt;
# Add a tunnel from local port 3128 (source port) to port 3128 on the server (destination).&lt;br /&gt;
# Save these settings and connect to the server.&lt;br /&gt;
# Set up the proxy in Firefox by going to Tools &amp;gt; Options &amp;gt; Advanced &amp;gt; Network and click on Settings.&lt;br /&gt;
# Set the radio button to Manual Proxy Configuration and type localhost in the HTTP Proxy field and 3128 in the port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[Secure File Transfer Protocols]]&lt;br /&gt;
* [[SSH Tunneling]]&lt;br /&gt;
* [[The X Windowing System]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;br /&gt;
*[http://www.xk72.com/midpssh/ MidpSSH] - An SSH client for mobile devices&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T23:18:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|WinSCP New Screen]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
SCP is a way to securely copy files. It is a part of the SSH protocol. The SCP command can be invoked at the command line, but there are easier methods. WinSCP provides an easy to use GUI to the SCP file copy protocol.&lt;br /&gt;
&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|500px|thumb|SSH Tunnel]]&lt;br /&gt;
One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to a port on the server machine. This allows the client to access services and daemons on the server that are not exposed to the internet. The traffic is sent to the port of the SSH server, decrypted by the server and then forwarded to the port requested by the client. One useful application of this is providing remote access to a Squid proxy server through Windows.&lt;br /&gt;
&lt;br /&gt;
# Set up the squid proxy on the server machine. Make a note of the port that the server is running on. (The default is 3128)&lt;br /&gt;
# Get PuTTY on the client machine and set up a session with the host.&lt;br /&gt;
# Go to the Connection &amp;gt; SSH &amp;gt; Tunnels screen in PuTTY.&lt;br /&gt;
# Add a tunnel from local port 3128 (source port) to port 3128 on the server (destination).&lt;br /&gt;
# Save these settings and connect to the server.&lt;br /&gt;
# Set up the proxy in Firefox by going to Tools &amp;gt; Options &amp;gt; Advanced &amp;gt; Network and click on Settings.&lt;br /&gt;
# Set the radio button to Manual Proxy Configuration and type localhost in the HTTP Proxy field and 3128 in the port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==See Also==&lt;br /&gt;
* [[Secure File Transfer Protocols]]&lt;br /&gt;
* [[SSH Tunneling]]&lt;br /&gt;
* [[The X Windowing System]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;br /&gt;
*[http://www.xk72.com/midpssh/ MidpSSH] - An SSH client for mobile devices&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:20:12Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|thumb|WinSCP New Screen]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpinterface.png|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br clear=all/&amp;gt;&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:15:21Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]&lt;br /&gt;
| [[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:07:50Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]&lt;br /&gt;
|}&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:07:31Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]&lt;br /&gt;
|}&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:05:42Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]&lt;br /&gt;
|}&lt;br /&gt;
{|align=&amp;quot;right&amp;quot;&lt;br /&gt;
|[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]&lt;br /&gt;
|}&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:04:23Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]{|align=&amp;quot;right&amp;quot;|[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]|}&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:03:46Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]{|align=&amp;quot;right&amp;quot;[[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]|}&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T12:00:40Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]][[Image:Winscpinterface.png|right|thumb|WinSCP Interface]]&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Winscpinterface.png</id>
		<title>File:Winscpinterface.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Winscpinterface.png"/>
				<updated>2008-04-13T11:59:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:59:29Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].[[Image:Winscpnew.png|right|thumb|WinSCP New Screen]]&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:58:05Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].[[Image:Winscpnew.png|right|500px|thumb|WinSCP New Screen]]&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Winscpnew.png</id>
		<title>File:Winscpnew.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Winscpnew.png"/>
				<updated>2008-04-13T11:56:51Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:56:30Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. The interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:55:31Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure. Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The pane on the left is the local computer and the pane on the right is the remote computer.&lt;br /&gt;
# To copy files from one side to the other, select the files and hit F5 or the Copy button at the bottom of the screen. Alternatively the user can drag/drop files from one pane to the other.&lt;br /&gt;
&lt;br /&gt;
Note: The default interface is the &amp;quot;Norton Commander interface shown here. Note that the interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button. This interface only displays the remote directory and allows the user to drag/drop files similar to how they would in Windows Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:52:41Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
# Start the program and click &amp;quot;New&amp;quot;&lt;br /&gt;
# Enter the host, user name and password as well as the type of protocol (SCP in this case).&lt;br /&gt;
# To save this information to the computer, click Save. Note that this will save the password in an easily recoverable format. A prompt appears asking you if you are sure.&lt;br /&gt;
# Otherwise, for a single Login, just click Login.&lt;br /&gt;
# The default interface is the &amp;quot;Norton Commander interface shown here. Note that the interface can be changed to an Explorer-like interface by clicking Options &amp;gt; Preferences &amp;gt; Interface and choosing the Explorer-like radio button.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:42:14Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
# Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-04-13T11:41:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
1. Download and install WinSCP from [http://winscp.net/eng/index.php here].&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
==Remote Backup/Restore==&lt;br /&gt;
&lt;br /&gt;
==X11 Forwarding==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-03-15T02:53:56Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
*One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*Some other stuff&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*Some references&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-03-15T00:53:46Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
One of the many benefits of SSH is that you can create an encrypted tunnel from a port on the client machine to &lt;br /&gt;
&lt;br /&gt;
[[Image:sshtunnel.jpg|right|500px|thumb|SSH Tunnel]]&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
*[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
*[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
*[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
*[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Sshtunnel.jpg</id>
		<title>File:Sshtunnel.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Sshtunnel.jpg"/>
				<updated>2008-03-15T00:51:32Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-03-14T23:31:01Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
&lt;br /&gt;
==SSH Tunneling==&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
[http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] - A free Telnet/SSH client&lt;br /&gt;
[http://winscp.net/eng/index.php WinSCP] - A free SCP/SFTP client for Windows&lt;br /&gt;
[http://sourceforge.net/projects/xming Xming] - A free X server for Windows&lt;br /&gt;
[http://cygwin.com/ Cygwin] - A linux like environment for Windows that contains an SSH package and an X server&lt;br /&gt;
[http://www.openssh.org/ OpenSSH] - Open source implementation of SSH&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH</id>
		<title>Applications of SSH</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Applications_of_SSH"/>
				<updated>2008-03-14T23:17:19Z</updated>
		
		<summary type="html">&lt;p&gt;Sweenet:&amp;#32;New page: SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.  ==Secure Shell== The most obvious use for...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH (Secure Shell) is an encrypted network protocol. It has many useful applications that solve all kinds of communication and security problems.&lt;br /&gt;
&lt;br /&gt;
==Secure Shell==&lt;br /&gt;
The most obvious use for SSH is to allow remote machines to access a shell on the host computer. The host machine must be running an SSH Daemon (sshd) which usually runs on port 22. The remote machine must use an SSH client to connect to the host. On Unix based systems, the command &amp;quot;ssh hostname&amp;quot; will connect to the host specified by hostname with the same username as the user running the command. Alternatively, the user can type &amp;quot;ssh username@hostname&amp;quot; to log in as a different user. In either case, the user will usually be asked to enter the password for the specified user on the host. &lt;br /&gt;
&lt;br /&gt;
==File Transfer Using SCP==&lt;br /&gt;
==SSH Tunneling==&lt;/div&gt;</summary>
		<author><name>Sweenet</name></author>	</entry>

	</feed>