Difference between revisions of "Introduction to Linux in HPC/SSH Connections"

From HPC Wiki
Introduction to Linux in HPC/SSH Connections
Jump to navigation Jump to search
Line 7: Line 7:
 
| Feldname2 = GPU      | Daten3 = Introduction to GPU Programming
 
| Feldname2 = GPU      | Daten3 = Introduction to GPU Programming
 
| Feldname3 = GPROF    | Daten4 = [https://hpc-wiki.info/hpc/GPROF_Tutorial Gprof Tutorial]  
 
| Feldname3 = GPROF    | Daten4 = [https://hpc-wiki.info/hpc/GPROF_Tutorial Gprof Tutorial]  
| Feldnamehead2 = [https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC Introduction to Linux in HPC]
+
| Feldnamehead2 = Introduction to Linux in HPC
 
| Feldname5 = 1. | Daten6 = [https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC/Historical_Background Historical Background]
 
| Feldname5 = 1. | Daten6 = [https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC/Historical_Background Historical Background]
 
| Feldname6 = 2. | Daten7 = [https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC/The_Command_Line The Command Line]
 
| Feldname6 = 2. | Daten7 = [https://hpc-wiki.info/hpc/Introduction_to_Linux_in_HPC/The_Command_Line The Command Line]

Revision as of 18:39, 21 October 2020

HPC.NRW
HPC.NRW
Other HPC Courses
GPU Introduction to GPU Programming
GPROF Gprof Tutorial
Introduction to Linux in HPC
1. Historical Background
2. The Command Line
3. Directory structure
4. Files
5. Text display search
6. Processes and permissions
7. The vim text editor
8. Shell scripting environment variables
9. System configuration files
10. Various tips
11. Beyond the cluster
12. Linux in HPC
12. SSH Login


Video


Quiz

1. Does it cause a security problem to share an SSH public key with your friends?

Yes
No


Which authentication for SSH login is more secure?

password authentication
public key authentication


When generating the SSH public/private key pair, is it secure to use empty passphrase?

Yes
No


Info:  Verify the fingerprint of remote host, before the first login.
User the SSH public key authentication for login.
Never use an empty passphrase for the SSH keys.
Use strong passphrase to generate the SSH keys.
Keep your private SSH key as top secret.
Create, configure and use different SSH keys for different remote hosts.
If no X11 application is required, disable X11 forwarding. Otherwise, only enable the untrusted X11 forwarding.


Warning:  lots of tips are given, no warning.

Note: Exercises in Terminal: no exercises in this section

Previous Page
Main Menu Page