Tuesday, June 18, 2013

Exercise 1: Introduction to Data Communications and Networking

Today, we discussed about Secure Shell (SSH). This is not the first time I encountered the term SSH. I once encountered it a couple of weeks ago when I uploaded a zip folder in a server and tutorials state that I need the support of ssh commands in order to unzip the folder in the server. But, it is always better to understand the basics than learning the more complicated topics because having a good foundation in everything that we learn is important.


The first item in the exercise is easy as eating a piece of cake. The picture below is a screenshot showing that a user was successfully added on my local computer. :)
Figure 1: Create a user on local computer

The goal of the second item is to login to a remote computer (server) via SSH using a username-password combination. The username and password given to me was sgs and icsuser14 respectively. Exercise item number 2 is a little confusing and I was stuck because I didn't know the exact command to use since the instruction states that we need to see ssh manual to see how ssh is used given the IP address and a user account. Good thing my instructor said the command to use I was able to accomplish item number 2. The picture below shows that I connected successfully to the remote server via SSH.


Figure 2: Login to a remote server


Exercise item number 3 showed us to configure the local computer for a passwordless login. Picture below shows the randomart image for the generated public key.



Figure 3: Generate a public key


I also learned that we can authorize keys so that we don't always have to enter our passwords when we need to access the server. The picture below shows that I hace logged in without having to type my password.


Figure 4: Login without entering password

 Item number four in the exercise is the start of the fun part. We were able to broadcast messages. Picture below shows a message of mine broadcasted to the users connected to the remote computer.


Figure 5: Broadcast a message to the connected computers


And for the last item in the exercise, we need to exchange messages from a particular user. Picture below shows a conversation with user mcb.
Figure 6: Chat with another user




For the last question:
If a different workstation is used to log in to the remote server, it will not be passwordless because the authorized key was saved on a local computer and it is not shared among other computers.


To wrap it all up, today's exercise was fun and it makes me think of ways on how to use public and private keys in protecting data being sent from one source to its destination. :)



















































No comments:

Post a Comment