Ch 7: Remote Connections: Help and Review

About This Chapter

The Remote Connections chapter of this Information Systems: Help & Review course is the simplest way to master remote connections. This chapter uses simple and fun lessons that only take about five minutes, plus lesson quizzes and a chapter exam to ensure you learn the essentials of remote connections.

Who's It For?

Anyone who needs help learning or mastering remote connections will benefit from the lessons in this chapter. There is no faster or easier way to learn about remote connections. Among those who would benefit are:

  • Students who have fallen behind in understanding the technology of remote connections
  • Students who struggle with learning disabilities or learning differences, including autism and ADHD
  • Students who prefer multiple ways of learning information systems (visual or auditory)
  • Students who have missed class time and need to catch up
  • Students who need an efficient way to learn about remote connections
  • Students who struggle to understand their teachers
  • Students who attend schools without extra technology learning resources

How It Works:

  • Find lessons in our course that cover what you need to learn or review.
  • Watch the video or read through the text lesson.
  • Refer to the transcripts or specific lesson sections to reinforce your learning.
  • Test your understanding of each lesson with short quizzes.
  • Verify you're ready by completing the Remote Connections chapter exam.

Why It Works:

  • Study Efficiently: Skip what you know, review what you don't.
  • Retain What You Learn: Engaging animations and examples make topics easy to grasp.
  • Be Ready on Test Day: Use the Remote Connections chapter exam to be prepared.
  • Get Extra Support: Ask our subject-matter experts any remote connection question. They're here to help!
  • Study With Flexibility: Watch videos and read text lessons on any web-ready device.

Students Will Review:

This chapter helps students review the concepts in a remote connections unit of a standard information systems course. Topics covered include:

  • SSH access and remote access
  • SSH access list and logs
  • Using SSH to access servers
  • Alternatives to SSH
  • Agent forwarding within SSH
  • Creating and adding SSH keys to a server
  • Comparing SSH to SSL, Telnet and VPN
  • Bash scripts
  • FTP connections
  • Connecting to and testing an FTP server
  • SFTP clients and transfers

23 Lessons in Chapter 7: Remote Connections: Help and Review
Test your knowledge with a 30-question chapter practice test
What is SSH Access?

1. What is SSH Access?

Learn what SSH is, the differences in security between SSH and Telnet, and how to access SSH on popular computing platforms. You'll learn why SSH is the preferred way to access computers remotely instead of Telnet.

SSH Access: List & Logs

2. SSH Access: List & Logs

Security measures are important these days, not only when sitting at your desk in the office, but when logging in remotely. In this lesson, we'll take a look at SSH, access lists, access logs, and how they are related.

Accessing a Server Via SSH

3. Accessing a Server Via SSH

Secure Shell (SSH) is a network protocol that gives users security in an unprotected network. SSH allows for remote access without having to sit at a computer and easy installation on common operating systems. In this lesson, we'll learn how to install SSH, use it to access remote servers, and more.

SSH Remote Access

4. SSH Remote Access

We many not always have the ability to physically access a computer we need to work on. SSH, or Secure Shell, allows us to access that computer from a remote location, and to do so securely. In this lesson, we'll learn what SSH is and look at a few examples.

SSH Alternatives

5. SSH Alternatives

The remote access of computers remotely is a very convenient facility. SSH is one of the more popular protocols, but in this lesson, we'll look at alternatives to SSH for remote access to computers. You'll learn about Telnet, Mosh and VPN, and why you might prefer one over the other.

SSH Agent Forwarding

6. SSH Agent Forwarding

Remote computer access is becoming more and more prominent these days. In this lesson, we'll take a look at SSH, what an SSH agent is, and what SSH agent forwarding means.

Generating & Adding SSH Keys to a Server

7. Generating & Adding SSH Keys to a Server

In this lesson, you'll learn how to generate SSH keys to store on a remote server. You'll be able to log in without a password on remote systems and also use a passphrase.

SSH & SSL

8. SSH & SSL

Security, security, security - the three most important areas in today's Internet-based world! In this lesson, we'll take a look at two important security technologies, SSL and SSH, and how they keep us safe.

Telnet vs. SSH

9. Telnet vs. SSH

Both Telnet and SSH allow you to access a computer remotely. In this lesson, we'll learn about the differences between the two and their respective advantages, and also take a closer look at some of the features of SSH.

SSH Proxy Tunnels

10. SSH Proxy Tunnels

In this lesson, we will examine what proxy tunneling is all about and understand what SSH proxy tunneling is. We will examine the three main uses of SSH proxy tunnels.

SSH vs VPN

11. SSH vs VPN

In this lesson, you'll learn the key differences between SSH and VPN for accessing remote servers and networks and which job is best for one or the other by looking at two typical users, Alice and Bob.

Using SSH as a VPN Alternative

12. Using SSH as a VPN Alternative

In this lesson, you'll follow an IT worker who uses SSH as a lightweight VPN alternative when traveling to maintain privacy. You'll see Alice set up a tunneled SSH connection to stay secure on the road without all the overhead of a corporate VPN connection.

SSH & Bash Scripts

13. SSH & Bash Scripts

Text-based access to computing resources is common these days, both from local, and remote locations. In this lesson, we'll take a look at SSH and Bash, their similarities, and what makes them different.

What is an FTP Connection?

14. What is an FTP Connection?

This lesson will cover FTP (File Transfer Protocol) connections. This protocol is used to transfer files between computers. FTP connection types will be discussed (active and passive), an example of an FTP connection between client and server is shown, and a sample FTP client is presented.

How to Connect to an FTP Server

15. How to Connect to an FTP Server

When we need to send files to another system, the File Transfer Protocol (FTP) method is safe and secure. To send files, however, we first have to connect to an FTP server. This lesson covers FTP connections and some of the common means of connecting.

Testing an FTP Connection

16. Testing an FTP Connection

How do you know if your File Transfer Protocol (FTP) Connection is working? What is an FTP Connection and how does work? In this lesson, we will try to answer these questions and show you how to test your (FTP) Connection.

What is an SFTP Client?

17. What is an SFTP Client?

Ever wonder how to copy files between computers, or even why you would want to? What is FTP? What is SFTP? And what in the world is an SFTP Client? In this lesson, we will define these terms, compare FTP to SFTP, and explain the concept of an SFTP Client.

How to use SFTP

18. How to use SFTP

Secure File Transfer Protocol, or SFTP, lets you access remote machines and their files. In this lesson, you'll learn what SFTP is, how to access SFTP from Windows, Mac OS X and Linux, as well as how to move files back and forth from a remote server.

Automating SFTP Transfers

19. Automating SFTP Transfers

Secure File Transfer Protocol (SFTP) is an excellent way to safely and securely copy files between computers over a secure connection. Automated file transfers are powerful ways to copy data files between computers without human intervention. The right tools make setting up this automation easy.

What is Bluesnarfing? - Definition, Tools & Prevention

20. What is Bluesnarfing? - Definition, Tools & Prevention

In this lesson, we'll learn about Bluesnarfing, a type of information theft that occurs over a Bluetooth connection. Learn what it is, why it is important, some tools used to detect it, and how we might go about preventing it.

What is Bluejacking?  - Definition, Tools & Prevention

21. What is Bluejacking? - Definition, Tools & Prevention

In this lesson, we'll take a look at bluejacking, what it is, why it is important, some tools used to detect it, and how we might go about preventing it.

Eavesdropping in Computer Security: Definition & Laws

22. Eavesdropping in Computer Security: Definition & Laws

In this lesson we will be examining the term eavesdropping with respect to computer security and the activities that constitute the crime by examining the laws that are in place.

What is a Pharming Attack? - Definition & Examples

23. What is a Pharming Attack? - Definition & Examples

In this lesson, you'll learn about pharming attacks and the various activities that hackers engage in to make the attack successful, as well as examples of vulnerabilities in computer systems that hackers exploit.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support