This software, called MacFUSE, lets you drag and drop files to an SSH-connected folder right in Finder, as if it were a regular network drive. Give your device a good shake to rescramble the maze. Double-tap on the screen to bring up the menu. Created with the Unity game engine and assets from Unity Technologies, textures from ArtSkillz free texture pack, audio from iLife Sound Effects, and fonts from the MacXWare Font Library. The Unity script for maze generation is on GitHub. Currently, the MacOS version of FulGaz is in 'beta' testing mode, but you can download it from the FulGaz website and start riding today! We’ve been testing this app ourselves behind the scenes, it’s 99% the same as the iOS (iPhone/iPad) version so we're not expecting any major issues. Fugu will start up a connection, and if this is the first time you've used Fugu on this computer to connect to the CAE Lab server, the following dialog will pop up: Click the Continue button to accept the file server's encryption key. Then, when prompted, enter your CAE Lab password in the Fugu window and click the Authenticate button.
|
Never, ever, use telnet. Ever. Or ftp. These programs send you password through the aether as clear text, opening you to exploits by all kinds of nefarious evildoers. Instead, learn to use ssh, scp, and sftp.
I'm generally a command-line person, but this free little application provides a nice intuitive and visually pleasing GUI interface that also permits integrated editing of remote files and so forth. Here's a screen shot grabbed from their website:
If you want to log in remotely to your account on another machine, simply issue the command
If you want to display X-windows programs on your machine that are run remotely, then include the -X or -Y flags:
Try -X first, as it is more secure. If there are problems, try the -Y option instead.
My DSL service provider seems to delight in causing my ssh connections to hang up. This irks me. I finally discovered a very simple solution. Create a file called ~/.ssh/config and put into it the following three lines:
Problem solved (at least for me).
.......
and append that public key to the appropriate file in your remote account's .ssh directory:
If the .ssh directory does not exist, you must first issue the command
and if the file ~/.ssh/authorized_keys does not yet exist, replace the above cat command with
(but do this only if ~/.ssh/authorized_keys does not yet exist, or it will clobber the file rather than append to the bottom of it.
With the 10.9 update, I found that I had to copy authorized_keys2 to authorized_keys
It should now be set up for passwordless secure login.
The idea of how to establish and use ssh tunnels, and why you might want to do this, is best illustrated with some examples. I have chosen two examples that you might very well want to put to use: Using a web proxy to access restricted websites (like scientific literature your library has a subscription to), and connecting to a mail server from anywhere, even if your local service provider tries to prevent this (DSL home service providers, hotel internet, etc).
For example, I can access most scientific journals on-line from machines that have recognized IP addresses (i.e., are affiliated with our university, whose library has paid for on-line access). If I am at home or on the road, I cannot do this easily unless I use a proxy server. Fortunately, this is fairly easy to do.
The syntax for establishing tunnel connections is as follows:
Choose a port, 8080, or any un-used non-root port. The -N flag says to establish the connection but not to make it a login shell, and the -D flag says to use dynamic port forwarding with ssh acting as a SOCKS server.
On Mac OS X, I use Safari as my primary web browser, but I keep several on hand. Because of this, I can dedicate FireFox as my proxy web browser. If FireFox is your primary web browser, other browsers in the Mozilla family, such as SeaMonkey, have this capability as well.
Then click the 'OK' button.
Thanks very much to James Davis and Adam Smith of UCSC SOE for the tip.
.
Apple's Mail program logs onto a mail server computer every time it checks your mail, and every time it sends your mail. Depending on your mail server, it might send your password over the internet in clear text, as our POP3 server does. This is something worth avoiding, especially if you are on the road or using a commercial internet service provider. To get around this problem, you can create a 'tunnel' using ssh. Essentially, you can trick the mail program into using a pre-established ssh connection instead of using the insecure connection, thereby avoiding having to send your password in clear text. In fact, if you have enabled passwordless login, you can avoid dealing with passwords altogether. As side benefits, the connection seems to be established faster, and you can send mail from anywhere that allows you to make an ssh connection to the mail-server computer. (Many locations and DSL providers forbid you to make an smtp connection to your own mail server to avoid spamming issues and to try to force you to use theirs.)
The syntax for establishing tunnel connections is as follows:
That is pretty much all there is to establishing the required tunnels for POP3 mail, but a bit of explanation is in order. If you would normally log into the computer that is your email host with a command of the form
then just subtitute what you would actually type for this to the right of the -N option flag in the above two tunnel commands. (These are the same names you put in the email program for POP3 mail server and smtp server, respectively.) The ports (110 and 25) are the (insecure) ports used for POP3 and smtp mail. (If you are using the ssl secure ports, there is no need to be doing this). Again, these are the same as you used for configuring mail. The -N flag says to establish the connection but not to make it a login shell. Don't change ``localhost.' The other two ports (1110 and 2525) are arbitrary choices. You can pick any (unused) port (although the ones below 1024 are reserved for root). The -L flag tells ssh to do port forwarding (i.e., to establish the tunnel, treating the local port 1110 as if it were the remote port 110). The (optional) -C flag is for compression. This is handy on a lower-speed connection, but might actually slow stuff down on a high-speed connection.
To get Mail.app to use your ssh tunnels, you have to reconfigure its settings.
I find that it is easy to start and maintain the tunnels using a simple free gui application called SSH Tunnel Manager. This saves you typing and remembering the above commands. Should you require permanent, always-on tunnels, it might be better to run a launchd item to do this.