RSS

How To See Who Logged Into a Computer and When

image

Have you ever wanted to monitor who’s logging into your computer and when? On Professional editions of Windows, you can enable logon auditing to have Windows track which user accounts log in and when.

The Audit logon events setting tracks both local logins and network logins. Each logon event specifies the user account that logged on and the time the login took place. You can also see when users logged off.

Enable Logon Auditing

First, open the local group policy editor – press the Windows key, type gpedit.msc in the Start menu, and press Enter. (You can also enable logon event auditing on a domain controller if you administer a network with centralized logins.)

Navigate to the following folder: Local Computer Policy –> Computer Configuration –> Windows Settings –> Security Settings –> Local Policies –> Audit Policy.

Double-click the Audit logon events policy setting in the right pane to adjust its options. In the properties window, enable the Success checkbox to log successful logons. You can also enable the Failure checkbox to log failed logins.

Viewing Logon Events

After enabling this setting, Windows will log logon events – including a username and time – to the system security log.

To view these events, open the Event Viewer – press the Windows key, type Event Viewer, and press Enter to open it.

Navigate to the Windows Logs –> Security category in the event viewer.

Look for events with event ID 4624 – these represent successful login events.

To see more information – such as the user account that logged into the computer – you can double-click the event and scroll down in the text box. (You can also scroll down in the text box underneath the list of events.)

If your security log is cluttered, you can click the Filter Current Log option in the sidebar and filter by event ID 4624. The Event Viewer will display only logon events.

Because this is just another event in the Windows event log with a specific event ID, you can also use the Task Scheduler to take action when a logon occurs. You can even have Windows email you when someone logs on.

 
Leave a comment

Posted by on December 27, 2013 in Uncategorized

 

Tags: , ,

How To Create a Shortcut That Lets a Standard User Run An Application as Administrator

image

Want to allow a standard user account to run an application as administrator without a UAC or password prompt? You can easily create a shortcut that uses the runas command with the /savecred switch, which saves the password.

Note that using /savecred could be considered a security hole – a standard user will be able to use the runas /savecred command to run any command as administrator without entering a password. However, it’s still useful for situations where this doesn’t matter much – perhaps you want to allow a child’s standard user account to run a game as Administrator without asking you.

We’ve also covered allowing a user to run an application as Administrator with no UAC prompts by creating a scheduled task.

Enabling the Administrator Account

First you’ll need to enable the built-in Administrator account, which is disabled by default.

To do so, search for Command Prompt in the Start menu, right-click the Command Prompt shortcut, and select Run as administrator.

Run the following command in the elevated Command Prompt window that appears:

net user administrator /active:yes

The Administrator user account is now enabled, although it has no password.

To set a password, open the Control Panel, select User Accounts and Family Safety, and select User Accounts. Click the Manage another account link in the User Accounts window.

Select the Administrator account, click Create a password, and create a password for the Administrator account.

Creating the Shortcut

Now we’ll create a new shortcut that launches the application with Administrator privileges.

Right-click the desktop (or elsewhere), point to New, and select Shortcut.

Enter a command based on the following one into the box that appears:

runas /user:ComputerName\Administrator /savecred “C:\Path\To\Program.exe

Replace ComputerName with the name of your computer and C:\Path\To\Program.exe with the full path of the program you want to run. For example, if your computer’s name was Laptop and you wanted to run CCleaner, you’d enter the following path:

runas /user:Laptop\Administrator /savecred “C:\Program Files\CCleaner\CCleaner.exe”

Enter a name for the shortcut.

To select an icon for your new shortcut, right-click it and select Properties.

Click the Change Icon button in the Properties window.

Select an icon for your shortcut. For example, you can browser to CCleaner.exe and choose an icon associated with it. If you’re using an other program, browse to its .exe file and select your preferred icon.

The first time you double-click your shortcut, you’ll be prompted to enter the Administrator account’s password, which you created earlier.

This password will be saved – the next time you double-click the shortcut, the application will launch as Administrator without asking you for a password.


As we mentioned above, the standard user account now has the ability to run any application as Administrator without entering a password (using the runas /savecred command to launch any .exe file), so bear that in mind.

The Administrator password is saved in the Windows Credential Manager – if you want to remove the saved password, you can do it from there.

 

 
Leave a comment

Posted by on December 27, 2013 in Uncategorized

 

Access My Computer Easily Without Forgotten Password

Way 1: Access Locked Computer by Another Administrator

This is another available administrator, which you can use to login Windows computer.

1. On Windows login screen, switch login user to another available administrator.

If your computer is installed with Windows 7, just press “Ctrl + Del + Alt” and click “Switch User” to switch to another user. If your computer is installed with Windows 8, on Windows login screen, just click the arrow on the left of user image, and there will list all users available on Windows 8. Choose one administrator you remember password.
 

2. Type password and press Enter to access computer.

 

Way 2: Access Computer with Password Reset

Step 1: Reset Forgotten User Password

There are several methods for forgotten password reset. The first one is to use administrator to change the forgotten user password. The second one is to reset the forgotten password with reset disk. The third one is to reset the forgotten password with Command Prompt.
1. Use the administrator to change the forgotten user password. Just sign into Windows computer with administrator like Way 1. And then navigate to Control Panel to change other users’ password. For example, on Windows 7 computer, go to Control Panel – User Accounts and Family Safety – User Accounts – Add or remove user accounts. Choose one account you want to change or remove its password. And then click “Change the password” or “Remove the password”. When you choose “Change the password”, type new password and confirm it. When you choose “Remove the password”, just click “Remove Password” again to make sure you want to remove it. And then you can set new password for this user account.

2. Reset forgotten password with reset disk. After you type the incorrect password to sign in to computer, a message link “Reset Password”will appear on the login screen after the password input box.

Click the link and follow the password reset wizard. Click “Next” and insert the password reset disk you have created. Choose the option’ password reset key disk ‘and click “Next”. Go on to follow and the type new password for this user and finish password reset.

3. Reset forgotten password with Command Prompt. When you are able sign in to Windows computer with another administrator, click Start, and run Command Prompt. For example, on Windows 8 computer, press Windows + X, and click on Command Prompt (Admin) and Yes. On the Command Prompt, type in: Net User <user name> <new password> and press Enter to reset a new password for Windows 8.
 

Step 2: Sign in to Windows Computer with new password

After you have changed or reset Windows password, restart computer. On Windows login screen, choose the user you have reset password to login.

Way 3: Access Computer without Password

This way is going to remove forgotten Windows password with password recovery tool when computer is locked. Afterwards, we can then access our computer without password.

Step 1: Get a Windows password recovery tool

Find Windows Password Genius on Internet and download trial one to have a try.

Step 2: Install and run Windows password recovery tool on another computer.

When your computer is locked, please find another available computer prepared for Windows password reset disk creation. Install and run it.

Step 3: Insert bootable USB or CD/DVD to create one reset disk.

After inserting bootable USB into computer, choose media type USB and choose password reset disk burning disk. Click “Begin burning” to start creating password reset disk into USB drive. When you see “Successfully burning” pops up, exit USB reset disk from available computer and plug it into locked computer.
 

Step 4: Set computer boot from USB

First, you have to enter BOOT Settings Option by pressing boot key when computer starting. Boot key is different for different computers. Second, choose Boot option and remove USB drive or “Removable Devices” to the first place of boot list. Third, save boot changes generally by F10.
 

Step 5: Remove Windows forgotten password

When computer boots from USB successfully, Windows password recovery tool runs too. Choose Windows and select a user you are going to remove password. And then click “Reset Password” button and Yes to make its password to be blank. The last step is to reboot computer and you can access computer without password. Remember eject USB from computer before it reboots.

 
Leave a comment

Posted by on December 20, 2013 in Uncategorized

 

Tags: , ,

Difference between Application Server and Web Server

Key difference: An application server is a software engine, which transfers an application from one device to another, whereas a web server is a computer running programs that accept the HTTP requests from the clients.

 

An application server functions the same as a computer that executes the commands requested by the Web server inorder to fetch the data from the databases. It transfers the applications from one device to another. It is a generalized software engine, which implements the execution of the application server in order to create the applications for different devices. The transferring function is not concerned with the type of application functions. The application server executes the assigned specific instances in the exact procedure and step wise approach of the programs, routines and scripts by supporting their applied applications.

 

An application server acts as a set or group of components that are accessed by the software developers through an API (Application Program Interface). Most Application Server Frameworks contain a comprehensive service layer model. There are basically the application providers which are serviced and accessed on the server side and then sent to the relevant demanded devices. Nowadays, many application servers target much more than a Web page generation. They implement the services like clustering, fail-over, and load-balancing; this enables the developers to focus on the implementation of the business logic.

 

The basic advantages of the Application servers are:

  • Data and Code Integrity: This is achieved by centralizing the business logic on an individual server, and the users here are guaranteed with the updates and upgrades of the application.
  • Centralized Configuration: It refers to the implementation changes of the application configuration.
  • Security: The security helps in the secured authentication of the applications.
  • Performance: It limits the network traffic of the client-server model, which helps in the improvement of performance of large applications.
  • Total Cost of Ownership:  All the above benefits, helps in the reduction of cost in an organization’s developing enterprise applications.
  • Transaction Support: It is a unit of activity, in which many updates to the resources are made as atomic.

 

A Web server can be a software (in the form of an application program) or hardware (in the form of a computer). Its basic function is to accept the HTTP (Hypertext Transfer Protocol) requests from the client side, then process and serve them back as the HTTP response along with the optional data content. The responses sent are in the form of HTML (Hypertext Markup Language) web pages or documents. The basic function of the Web server is to transfer the web content, which are accessed through the internet to the respective Clients.

 

The web servers are responsible to conduct the transactions between the client and server. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents, which includes the images, style sheets and scripts along with the text content. The web browser or web crawlers are the user agents, which are wholly responsible for initiating the communication. These convert the HTTP requests in the form of HTML web pages (if not able to do the conversion they respond back into a error message). Many generic web servers also support server-side scripting using an Active Server Pages (ASP), PHP, or other scripting languages. The web servers are not always used to access the World Wide Web (WWW) but are also embedded in devices such as the printers, routers, web-cams and serving only a local network. The web server once installed in these systems, can be used as a part of monitoring or administering the device system. Web servers are also able to map the path component of a Uniform Resource Locator (URL).

 

The most commonly performed features of the Web Servers are:

  • Virtual Hosting: This function serves many web sites using one IP address.
  • Large File Support:  This system serves the files whose sizes are greater than 2 GB on 32 bit OS (Operating System).
  • Bandwidth Throttling: It limits the speed of the responses in order to control the saturation of networks, accordingly be able to serve more clients at a time.
  • Server-Side Scripting: These generate the dynamic web pages, by keeping the web server and website implementations separate from each other.

 

Comparison between Application Server and Web Server:

 

 

Application Server

Web Server

Short descriptions An application server is a software framework that provides an environment in which applications can run, no matter what the applications are. A web server can refer to either the hardware or the software that helps to deliver web content that can be accessed through the Internet.
Basically, they do It transfers the business logic to client applications through various protocols including HTTP. It only handles the HTTP protocol.
Functions Its function is to deliver various applications to another device; it allows everyone in the network to run software off of the same machine. Its function is to keep the HTML, PHP, and ASP, etc. files available for the web browsers to view when a user accesses the site on the web, handles HTTP requests from clients.
Other usage It is also used to serve the web based applications and enterprise based applications. Along with the hosting of the websites, the web servers are also used on other applications such as gaming, data storage or running enterprise applications.
Resource utilizations The resource utilization is low here. The resource utilization is more here as compared to the application servers.
Examples Sun Java Application server, Apache Geronimo, IBM WebSphere Application Server, Glass Fish Server, etc. Apache, Microsoft IIS, Tomcat, Jetty, etc.
 
Leave a comment

Posted by on December 20, 2013 in Uncategorized

 

Tags: ,

Difference between FAT32 and NTFS

Key difference:  FAT32 and NTFS are file systems and disk standards used for partitioning and formatting the hard drives. If compared, FAT32 is older and simpler version to that of NTFS, which is new and well-featured version of file system.

 

FAT32 is a version of the File Allocation Table which is available in the Windows 95 OSR 2 and Windows 98 operating systems. It is the common file system which is used in most the computers. The file system obtained its name from the fact that it uses a table of 32-bit storage. Its basic function is to record the disk addresses of each file during the partition. The file system can have up to 24 partitions, which may range from 32MB to 137GB. These partitions operates under the Windows 9x operating system, and they are responsible to available the space on the hard disk.  There are limitations of the Windows9x operating system, which are to be considered while making the partitions available. All the remaining operating systems use the FAT32 file system as per their accordance and capability. The FAT32 file system is typically used as a means of file storage in a Windows 9x computer, on a partition not exceeding 126GB.

 

The FAT32 provides the following improvements over the older FAT versions:

  • FAT32 supports drives up to 2 terabytes in size.
  • FAT32 uses space more efficiently.
  • FAT32 uses smaller clusters (that is, 4-KB clusters for drives up to 8 GB in size), resulting in 10 to 15 percent more efficient use of disk space relative to large FAT or FAT16 drives.
  • FAT32 is more robust compared to the older FAT versions.
  • FAT32 is more flexible, its root folder drives an ordinary cluster chain, which enables the file system to be available at any corner on the drive.

 

NTFS is an advanced and featured rich file systems. The acronym NTFS stands for, New Technology File System. This file system is the most advanced and latest file system, which has a highly advanced writing techniques, improved security and high capability of space utilization. The hard disk when formatted is divided into partitions or major divisions. Within every partition, the operating system keeps track of all the files, which are stored by that respective OS (Operating System). Hence, each file is now stored on a hard disk in one or more cluster or group format, which ranges from 512 byte to 64 bytes. The files are recorded into a special file format in NTFS, these file format are known as Master File Table (MFT). These records are further used to locate the files if scattered among the clusters. NTFS also tries to find the contiguous storage space, which holds the entire file along with its clusters.

 

Some the most important features of NFTS are:

  • NTFS uses a b-tree directory scheme, in order to keep the tracks of file clusters.
  • NTFS stores the information about any file cluster and other data.
  • NTFS supports the large files (ranging up to 2 to the 64th power or approximately 16 billion bytes in size).
  • NTFS consists of an Access Control List (ACL), which allows the server administrator to control the user, who accesses the specific files.
  • NTFS possesses the integrated file compression system.
  • NTFS supports the Unicode, which are based on name systems.
  • NTFS along with the longer file names also supports the “8 by 3” names.
  • It provides the data security on both, removable and fixed disks.

 

Comparison between FAT32 and NTFS:

 

 

FAT32

NTFS

Acronym File Allocation Table 32 New Technology File System.
Introduced It was introduced in 1977. It was introduced in 1993.
They are FAT32 is a standard system as it supports more versions of Windows. NTFS newer versions of windows such as Windows XP, Windows 2000 and higher.
Versions FAT32 is the older Microsoft file system. NTFS is the current file system used by Windows.
File size Maximum file size 4 GB. File size limited by size of volume.
Supporting and requirement of the OS It does not support the Windows 2000 or Windows 2003 Active Directory. It requires the use of Windows 2000 or Windows 2003 Active Directory or shared cluster drives.
Accessing Does not allow access to files on the hard disk with MS-DOS. Does not allow access to files on the hard disk with MS-DOS.
Recovery capability It does not have the capability to recover from some disk-related errors automatically. It has the capability to recover from some disk-related errors automatically.
File processing speed It is slow in the file transferring process. It is faster as compared to the file transferring process.
File compression method FAT32 does not support the file compression method. NTFS supports file compression.
Conversions FAT32 can be converted to NTFS. It is complex to convert NTFS back to FAT32.
 
Leave a comment

Posted by on December 20, 2013 in Uncategorized

 

Tags: , , ,

Difference between Workgroup and Domain

Key difference: A workgroup is a type of peer-to-peer network. It is essentially the name for a Windows based peer-to-peer computer network. Computers in this kind of network can allow each other access to their files, printers, or Internet connection. A domain, on the other hand, is a client/server network in which the security and resource management is centralized. This means that a singular administration has control over the domain and allows which users have access to which files.

 

Domains and workgroups are two different methods for organizing computers in a network. The main difference between the two is in the manner they operate, chiefly how the computers and other resources on the networks are managed.

 

A workgroup is a type of peer-to-peer network. It is essentially the name for a Windows based peer-to-peer computer network. Computers in this kind of network can allow each other access to their files, printers, or Internet connection. In order to do this, every user must have an account on each of the workgroup’s computers that they require access to. These settings and access are managed by each computer’s user.

 

A domain, on the other hand, is a client/server network in which the security and resource management is centralized. This means that a singular administration has control over the domain and allows which users have access to which files. In a domain, there is a one single database for domain users. A user can log on at any workstation via their account and access the files.

 

Advantages of Domain over workgroup:

  • Centralized administration
  • User can log on at any workstation and access domain resources.
  • Security of data, user and groups
  • Runs on Windows 2000 and 2003 Server or advance support for server configuration
  • File, folder & user and group permission can be assigned.

 

A side-to-side comparison of workgroup and domain:

 

Workgroup

Domain

Network type Peer-to-peer Windows computer network Client/server network
Log in User needs to have separate log in id and password at each workstation User can log on at any workstation via their account and access domain resources
Workstations Computers are limited to maximum 10 There can be up to 2000 computers
Administrator Each user controls the resources and security locally on their PC’s One administrator to administer the domain and its users and resources.
Location All computers must be on the same local network or subnet. The computers can be on different local networks, i.e. anywhere in the world.
Computer’s settings Each user controls the settings on their own computer. No central settings. One can make only limited changes to a computer’s settings because network administrators often want to ensure consistency among computers.
Changes Each computer must be changed manually or once changed must be transferred to each computer. Changes made to one are automatically made to all computers
Security User needs to have separate log in id and password at each workstation, but once logged in can access the computer. Domain users must provide a password or other credentials each time they access the domain.
 
Leave a comment

Posted by on December 20, 2013 in Uncategorized

 

How Do You Find Your Windows 7 Homegroup Password? [Answers]

So you’re about to setup your new Windows 7 PC into your Homegroup when you realized that you have no idea what the password is. How do you find it? It’s actually pretty simple, if you know where to look.

image


Finding Your Homegroup Password

Open up Windows Explorer, and then find the Homegroup option in the left-hand navigation pane. Right-click on Homegroup and choose “View the HomeGroup password”

And there you go, your password in nice bold text—and there’s even a print button.

Rather easy, wasn’t it?

 
Leave a comment

Posted by on April 25, 2012 in Information technology

 

How to Set a Custom Logon Screen Background on Windows 7

How to Set a Custom Logon Screen Background on Windows 7

image

Windows 7 makes it possible to change the welcome screen that appears when you start your computer without any third-party software, but this setting is well hidden. You can set any image you like as your background.

This setting is intended for original equipment manufacturers (OEMs) to customize their systems, but there’s nothing stopping you from using it yourself. All you have to do is change a single registry value and put an image file in the correct location.

Enabling Custom Backgrounds

This feature is disabled by default, so you’ll have to enable it from the Registry Editor. You can also use the Group Policy Editor if you have a Professional version of Windows – scroll down a bit for the Group Policy Editor method.

Launch the Registry Editor by typing regedit into the search box in the Start menu and pressing Enter.

In the Registry Editor, navigate to the following key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background

You’ll see an DWORD value named OEMBackground. If you don’t see it, right-click in the right pane, point to the New submenu and create a new DWORD value with this name.

Double-click the OEMBackground value and set its value to 1.

Note that selecting a new theme in the Appearance and Personalization window will “unset” this registry value. Selecting a theme will change the value of the key to the value stored in the theme’s .ini file, which is probably 0 – if you change your theme, you’ll have to perform this registry tweak again.

Changing the setting in group policy will allow it to persist even when you change your theme, but the Group Policy Editor is only available in Professional editions of Windows.

If you have access to the Group Policy Editor, launch gpedit.msc from the Start menu.

Navigate to the following section in the Group Policy Editor window:

Computer Configuration\Administrative Templates\System\Logon

You’ll find a setting named “Always use custom login background.” Double-click it and set it to Enabled.

Setting An Image

Your image file must be less than 256 KB in size. It’s also a good idea to use an image file that matches the resolution of your monitor, so it won’t look stretched.

Windows looks for the custom logon screen background image in the following directory:

C:\Windows\System32\oobe\info\backgrounds

By default, the info and backgrounds folders don’t exist. Navigate to the C:\Windows\System32\oobe folder and create them yourself by right-clicking inside the folder, pointing to New, and selecting New Folder.

Copy your desired background image to the backgrounds folder and name it backgroundDefault.jpg.

(I can see the inevitable question coming in the comments, so if you like this wallpaper image, you can get it here.)

The change will take effect immediately – no system reboot required. The first time you log out or lock your screen (try the WinKey-L keyboard shortcut), you’ll see your new background.

By- Chris

 
Leave a comment

Posted by on April 25, 2012 in Uncategorized

 

How to Batch Rename Files in Windows: 4 Ways to Rename Multiple Files

How to Batch Rename Files in Windows: 4 Ways to Rename Multiple Files

image

Windows comes with a variety of ways to rename multiples files at once from Windows Explorer, the Command Prompt, or PowerShell. Whether you’re looking for an easy-to-use graphical interface or a powerful command-line method, you’ll find it here.

The Windows Explorer method is fast, but lacking in flexibility. PowerShell is extremely flexible – but it can be intimidating if you’re new to PowerShell. If you’re looking for a powerful graphical interface, a third-party utility is your best bet.

Windows Explorer

Windows Explorer has a quick, built-in way to rename multiple files at once, although it’s pretty well hidden.

To get started, locate the files you want to rename and place them in the same folder. Use the columns at the top of the list in details view to order the files how you’d like them – Windows Explorer will number the files starting from the top at the list.

Select all the files you want to rename, right-click the first one and select Rename. Type your desired base file name and press Enter.

Windows Explorer will take your base name and add a number to each file’s name. This method is good for cleaning up messy names, although it isn’t very flexible.

Command Prompt

You can use the rename – or ren – DOS command in a Command Prompt window to rename multiple files at once. It accepts the wildcard character – * – to match multiple files. The quickest way to open a Command Prompt window at your desired location is to hold Shift, right-click in the folder, and select “Open command window here.”

The most obvious use case for the rename command is changing multiple file extensions at once – something you can’t do in Windows Explorer. The following command will rename all .html files in the current folder to .txt files:

ren *.html *.txt

This command doesn’t offer a lot of power on its own, although it can be integrated into more complex batch scripts.

PowerShell

PowerShell offers much more flexibility for renaming files in a command-line environment. Using PowerShell, you can pipe the output of one command – known as a “commandlet” in PowerShell terms — to another command, just like you can on Linux and other UNIX-like systems.

The two important commands you’ll need are Dir, which lists the files in the current directory, and Rename-Item, which renames an item (a file, in this case). Pipe the output of Dir to Rename-Item and you’re in business.

After you launch PowerShell, use the cd command to enter the directory containing your files. You should put the files in their own directory so you don’t accidentally rename other files.

For example, let’s say we don’t want the space character in our file names – we’d rather have an underscore instead.

The following command lists the files in the current directory and pipes the list to Rename-Item. Rename-Item replaces each space character with an underscore.

Dir | Rename-Item –NewName { $_.name –replace “ “,”_” }

Replace the “ “ and “_” parts of the command to replace other characters in file names.

Consult Microsoft’s documentation on the Rename-Item commandlet if you want  help performing other, more advanced operations.

Third-Party Utilities

If you need a powerful way to rename multiple files at once — without messing with the command line – you’ll want a third-party utility. Jason Fitzpatrick previously wrote aboutBulk Rename Utility, his favorite. Bulk Rename Utility has a cluttered-looking interface that exposes the huge amount of options you’d normally achieve with regular expressions and complicated command-line options.

After installing the tool, navigate to the files you want to rename and select them.

Change some options in one or more of the panels and you’ll see a preview of your changes appear in the New Name column. For example, let’s say we want to remove everything but the number and just have numbered image files. We can set the Remove panel to remove the first 10 characters and the last 1 character.

Click the Rename button to rename the files.

 
Leave a comment

Posted by on April 25, 2012 in Uncategorized

 

Configure linux telnet server step by step guide example and implementation

How to configure linux ssh server step by step guide Example and Implementation

Telnet and FTP are well-known protocol but they send data in plain text format, which can be captured by someone using another system on the same network, including the Internet.

On the other hand, all data transferred using OpenSSH tools is encrypted, making it inherently more secure. The OpenSSH suite of tools includes ssh for securely logging in to a remote system and executing remote commands, scpfor encrypting files while transferring them to a remote system, and sftp for secure FTP transfers.

OpenSSH uses a server-client relationship. The system being connected to is referred to as the server. The system requesting the connection is referred to as the client. A system can be both an SSH server and a client. OpenSSHalso has the added benefits of X11 forwarding and port forwarding.

X11 forwarding, if enabled on both the server and client, allows users to display a graphical application from the system they are logged in to on the system they are logged in from.

Port forwarding allows a connection request to be sent to one server but be forwarded to another server that actually accepts the request.

In this article we will discusses how to use OpenSSH, both from the server-side and the client-side.

Configuring the ssh Server

The openssh-server RPM package is required to configure a Red Hat Enterprise Linux system as an OpenSSH server. If it is not already installed, install it with rpm commands as described in our pervious article. After it is installed, start the service as root with the command service sshd start . The system is now an SSH server and can accept connections. To configure the server to automatically start the service at boot time, execute the command chkconfig sshd on as root. To stop the server, execute the command service sshd stop. To verify that the server is running, use the command service sshd status.

Configure ssh server

In this example we will configure a ssh server and will invoke connection from client side.

For this example we are using two systems one linux server one linux clients . To complete these per quest of ssh server Follow this link

per quest of ssh server

  • A linux server with ip address 192.168.0.254 and hostname Server
  • A linux client with ip address 192.168.0.1 and hostname Client1
  • Updated /etc/hosts file on both linux system
  • Running portmap and xinetd services
  • Firewall should be off on server

We have configured all these steps in our pervious article.

necessary configuration for ssh server

We suggest you to review that article before start configuration of ssh server. Once you have completed the necessary steps follow this guide.

Three rpm are required to configure ssh server. openssh-server, portmap, xinetd check them if not found then install
rpm

Now check sshd, portmap, xinetd service in system service it should be on

 #setup Select System service from list [*]portmap [*]xinetd [*]sshd 

Now restart xinetd and portmap and sshd service
service restart
ssh restart
To keep on these services after reboot on then via chkconfig command
chkconfig
After reboot verify their status. It must be in running condition
service status

Create a normal user named vinita
useradd

On Linux client

ping from ssh server and run ssh command and give root password

root login

By default ssh command will enable root session. If you want to login from normal user then specify his name with -l options.
user login

With ssh you can run any command on server without login (user password require)
ssh command

 
Leave a comment

Posted by on April 25, 2012 in Information technology