About This Chapter
Who's It For?
Anyone who needs help learning or mastering remote connections will benefit from the lessons in this chapter. There is no faster or easier way to learn about remote connections. Among those who would benefit are:
- Students who have fallen behind in understanding the technology of remote connections
- Students who struggle with learning disabilities or learning differences, including autism and ADHD
- Students who prefer multiple ways of learning information systems (visual or auditory)
- Students who have missed class time and need to catch up
- Students who need an efficient way to learn about remote connections
- Students who struggle to understand their teachers
- Students who attend schools without extra technology learning resources
How It Works:
- Find lessons in our course that cover what you need to learn or review.
- Watch the video or read through the text lesson.
- Refer to the transcripts or specific lesson sections to reinforce your learning.
- Test your understanding of each lesson with short quizzes.
- Verify you're ready by completing the Remote Connections chapter exam.
Why It Works:
- Study Efficiently: Skip what you know, review what you don't.
- Retain What You Learn: Engaging animations and examples make topics easy to grasp.
- Be Ready on Test Day: Use the Remote Connections chapter exam to be prepared.
- Get Extra Support: Ask our subject-matter experts any remote connection question. They're here to help!
- Study With Flexibility: Watch videos and read text lessons on any web-ready device.
Students Will Review:
This chapter helps students review the concepts in a remote connections unit of a standard information systems course. Topics covered include:
- SSH access and remote access
- SSH access list and logs
- Using SSH to access servers
- Alternatives to SSH
- Agent forwarding within SSH
- Creating and adding SSH keys to a server
- Comparing SSH to SSL, Telnet and VPN
- Bash scripts
- FTP connections
- Connecting to and testing an FTP server
- SFTP clients and transfers
1. What is SSH Access?
Learn what SSH is, the differences in security between SSH and Telnet, and how to access SSH on popular computing platforms. You'll learn why SSH is the preferred way to access computers remotely instead of Telnet.
2. SSH Access: List & Logs
Security measures are important these days, not only when sitting at your desk in the office, but when logging in remotely. In this lesson, we'll take a look at SSH, access lists, access logs, and how they are related.
3. Accessing a Server Via SSH
Secure Shell (SSH) is a network protocol that gives users security in an unprotected network. SSH allows for remote access without having to sit at a computer and easy installation on common operating systems. In this lesson, we'll learn how to install SSH, use it to access remote servers, and more.
4. SSH Remote Access
We many not always have the ability to physically access a computer we need to work on. SSH, or Secure Shell, allows us to access that computer from a remote location, and to do so securely. In this lesson, we'll learn what SSH is and look at a few examples.
5. SSH Alternatives
The remote access of computers remotely is a very convenient facility. SSH is one of the more popular protocols, but in this lesson, we'll look at alternatives to SSH for remote access to computers. You'll learn about Telnet, Mosh and VPN, and why you might prefer one over the other.
6. SSH Agent Forwarding
Remote computer access is becoming more and more prominent these days. In this lesson, we'll take a look at SSH, what an SSH agent is, and what SSH agent forwarding means.
7. Generating & Adding SSH Keys to a Server
In this lesson, you'll learn how to generate SSH keys to store on a remote server. You'll be able to log in without a password on remote systems and also use a passphrase.
8. SSH & SSL
Security, security, security - the three most important areas in today's Internet-based world! In this lesson, we'll take a look at two important security technologies, SSL and SSH, and how they keep us safe.
9. Telnet vs. SSH
Both Telnet and SSH allow you to access a computer remotely. In this lesson, we'll learn about the differences between the two and their respective advantages, and also take a closer look at some of the features of SSH.
10. SSH Proxy Tunnels
In this lesson, we will examine what proxy tunneling is all about and understand what SSH proxy tunneling is. We will examine the three main uses of SSH proxy tunnels.
11. SSH vs VPN
In this lesson, you'll learn the key differences between SSH and VPN for accessing remote servers and networks and which job is best for one or the other by looking at two typical users, Alice and Bob.
12. Using SSH as a VPN Alternative
In this lesson, you'll follow an IT worker who uses SSH as a lightweight VPN alternative when traveling to maintain privacy. You'll see Alice set up a tunneled SSH connection to stay secure on the road without all the overhead of a corporate VPN connection.
13. SSH & Bash Scripts
Text-based access to computing resources is common these days, both from local, and remote locations. In this lesson, we'll take a look at SSH and Bash, their similarities, and what makes them different.
14. What is an FTP Connection?
This lesson will cover FTP (File Transfer Protocol) connections. This protocol is used to transfer files between computers. FTP connection types will be discussed (active and passive), an example of an FTP connection between client and server is shown, and a sample FTP client is presented.
15. How to Connect to an FTP Server
When we need to send files to another system, the File Transfer Protocol (FTP) method is safe and secure. To send files, however, we first have to connect to an FTP server. This lesson covers FTP connections and some of the common means of connecting.
16. Testing an FTP Connection
How do you know if your File Transfer Protocol (FTP) Connection is working? What is an FTP Connection and how does work? In this lesson, we will try to answer these questions and show you how to test your (FTP) Connection.
17. What is an SFTP Client?
Ever wonder how to copy files between computers, or even why you would want to? What is FTP? What is SFTP? And what in the world is an SFTP Client? In this lesson, we will define these terms, compare FTP to SFTP, and explain the concept of an SFTP Client.
18. How to use SFTP
Secure File Transfer Protocol, or SFTP, lets you access remote machines and their files. In this lesson, you'll learn what SFTP is, how to access SFTP from Windows, Mac OS X and Linux, as well as how to move files back and forth from a remote server.
19. Automating SFTP Transfers
Secure File Transfer Protocol (SFTP) is an excellent way to safely and securely copy files between computers over a secure connection. Automated file transfers are powerful ways to copy data files between computers without human intervention. The right tools make setting up this automation easy.
20. What is Bluesnarfing? - Definition, Tools & Prevention
In this lesson, we'll learn about Bluesnarfing, a type of information theft that occurs over a Bluetooth connection. Learn what it is, why it is important, some tools used to detect it, and how we might go about preventing it.
21. What is Bluejacking? - Definition, Tools & Prevention
In this lesson, we'll take a look at bluejacking, what it is, why it is important, some tools used to detect it, and how we might go about preventing it.
22. Eavesdropping in Computer Security: Definition & Laws
In this lesson we will be examining the term eavesdropping with respect to computer security and the activities that constitute the crime by examining the laws that are in place.
23. What is a Pharming Attack? - Definition & Examples
In this lesson, you'll learn about pharming attacks and the various activities that hackers engage in to make the attack successful, as well as examples of vulnerabilities in computer systems that hackers exploit.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Information Systems: Help and Review course
- Introduction to Computers: Help and Review
- Information Systems in Organizations: Help and Review
- Hardware and Systems Technology: Help and Review
- Systems Software and Application Software: Help and Review
- Internet, Intranet, and Extranet: Help and Review
- Network Systems Technology: Help and Review
- Enterprise Business Systems: Help and Review
- Decision Support & Specialized Information Systems: Help & Review
- Systems Development: Help and Review
- Data Management: Help and Review
- Ethical, Social & Business Issues in IT: Help & Review
- Introduction to Programming: Help and Review
- Learning Computer Science
- Business, Social & Ethical Implications & Issues: Help & Review
- Working with Java
- Java Programming Terminology
- Java Programming Overview
- Java Programming Problems