Книга: Fedora™ Unleashed, 2008 edition
Logging In and Out from a Remote Computer
Logging In and Out from a Remote Computer
Although you can happily log in on your computer, an act known as a local login, you can also log in to your computer via a network connection from a remote computer. Linux-based operating systems provide a number of remote access commands you can use to log in to other computers on your local area network (LAN), wide area network (WAN), or the Internet. Note that not only must you have an account on the remote computer, but the remote computer must be configured to support remote logins—otherwise, you won't be able to log in.
NOTE
See Chapter 14, "Networking," to see how to set up network interfaces with Linux to support remote network logins and Chapter 11 to see how to start remote access services (such as sshd).
The best and most secure way (barring future exploits) to log in to a remote Linux computer is to use the ssh
or Secure Shell client. Your login and session are encrypted while you work on the remote computer. The ssh
client features many different command-line options, but can be simply used with the name or IP address of the remote computer, like this:
[andrew@teletran ~]$ ssh 192.168.0.10
The authenticity of host '192.168.0.10 (192.168.0.10)' can't be established.
RSA key fingerprint is 32:90:31:1e:31:1c:a8:d4:9a:0b:07:78:93:9d:65:df.
Are you sure you want to continue connecting (yes/no)? yes
The first time you connect with a remote computer using ssh, Linux displays the remote computer's encrypted identity key and asks you to verify the connection. After you type yes
and press Enter, you are warned that the remote computer's identity (key) has been entered in a file named known_hosts
under the .ssh
directory in your home directory. You are also prompted to enter your password:
Warning: Permanently added '192.168.0.10' (RSA)
to the list of known hosts.
[email protected]'s password:
andrew@fedora:~$
After entering your password, you can then work on the remote computer. Again, every thing you enter on the keyboard in communication with the remote computer is encrypted. Use the exit
or logout commands to exit your session and return to the shell on your computer.
- Ограничение времени ожидания для транзакций (Lock timeout)
- Инструкция INSERT INTO ... FROM ... UNION ...
- Разработка приложений баз данных InterBase на Borland Delphi
- Open Source Insight and Discussion
- DEADLOCK TIMEOUT
- CONNECTION TIMEOUT
- Introduction to Microprocessors and Microcontrollers
- TCP REMOTE BUFFER
- About the author
- Chapter 6. Traversing of tables and chains
- Chapter 8. Saving and restoring large rule-sets
- Chapter 11. Iptables targets and jumps