Table of Contents
ToC

ToC2. SSH

Traditional terminal programs have no graphical interface of their own. You can use them in a window inside a graphical user interface like Microsoft Windows, the X Window System, or Mac OS X, but there are no menus or icons.

There are some useful graphical versions of the SSH program for windowing systems which add extra functions like letting you store frequently-used addresses, usernames, and passwords. In these cases, it is generally A Bad Idea to store the passwords, as anyone who can use your computer would then also be able to log in to your remote sites.

Up to start of section2.1. Logging in

The very first time you connect to the server with SSH from a computer where you haven't done this before, it may ask if you wish to accept the public security key (this may be displayed in a separate pop-up window): answer by clicking  OK  or by typing yes and pressing Enter.

Terminal Commands
_=X
The authenticity of host 'www.ucc.ie (143.239.1.112)' can't be established.
RSA key fingerprint is fc:10:cc:1e:54:53:f3:03:46:58:6c:0f:32:e3:5f:79.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'www.ucc.ie' (RSA) to the list of known hosts.

login as: ontology
ontology@www.ucc.ie's password:         

SSH will then ask for your password: type in your password and press Enter. Once you are logged in, it's just a normal terminal.

The password will not be displayed, not even as a row of dots. Make sure you type it correctly!

On subsequent occasions you will just be asked for your username and password.

Up to start of section2.2. Changing your password

Passwords expire every 90 days on UCC servers. If you cannot log in, it's probably because your password has expired. To have your password reset, email the webmaster.

Table of Contents
ToC
RSS newsfeedKeep up to date with our RSS newsfeed