Difference between revisions of "Tutorial6: File Transfer / Sending Email Messages"
(→Main Objectives of this Practice Tutorial) |
(→KEY CONCEPTS) |
||
Line 44: | Line 44: | ||
= KEY CONCEPTS = | = KEY CONCEPTS = | ||
+ | |||
+ | The '''ssh''' Linux command is actually a '''suite of tools''' to allow the user to not only issue commands securely between Unix / Linux servers, but also securely copy and transfer files among Unix/Linux servers via the commands '''scp''' and '''sftp'''. | ||
+ | |||
+ | In this tutorial, you will learn several different methods to securely transfer files from your Matrix Linux account to other computers using Linux commands including '''scp''', '''sftp''' and '''mail'''. | ||
===Secure Copy=== | ===Secure Copy=== |
Revision as of 07:36, 27 January 2020
Contents
TRANSFERRING FILES / USING THE MAIL COMMAND
Main Objectives of this Practice Tutorial
- List common utilities combined with the ssh suite of utilities
- Securely copy files between Unix/Linux servers using the scp command
- Securely transfer copies of files between Unix/Linux servers using the sftp command
- Use the mail command to send email messages to your Seneca email account
- Use the mail command to send email with file attachments to your Seneca email account
Tutorial Reference Material
Course Notes |
Definitions / Commands |
YouTube Videos | ||
Course Notes: | Definitions: | File Transfer Commands: | Instructional Videos:
|
KEY CONCEPTS
The ssh Linux command is actually a suite of tools to allow the user to not only issue commands securely between Unix / Linux servers, but also securely copy and transfer files among Unix/Linux servers via the commands scp and sftp.
In this tutorial, you will learn several different methods to securely transfer files from your Matrix Linux account to other computers using Linux commands including scp, sftp and mail.
Secure Copy
x
Secure File Transmission Control Protocol
x
Sending Emails (with Attachments)
x
INVESTIGATION 1: USING SECURE COPY
In this section, you will learn how to ...
Perform the Following Steps:
- x
In the next investigation, you will ...
INVESTIGATION 2: USING SECURE TRANSMISSION CONTROL PROTOCOL
In this section, you will learn how to ...
Perform the Following Steps:
- x
In the next investigation, you will ...
INVESTIGATION 3: USING THE MAIL COMMAND
In this section, you will learn how to ...
Perform the Following Steps:
- x
LINUX PRACTICE QUESTIONS
The purpose of this section is to obtain extra practice to help with quizzes, your midterm, and your final exam.
Here is a link to the MS Word Document of ALL of the questions displayed below but with extra room to answer on the document to simulate a quiz:
https://ict.senecacollege.ca/~murray.saul/uli101/uli101_week6_practice.docx
Your instructor may take-up these questions during class. It is up to the student to attend classes in order to obtain the answers to the following questions. Your instructor will NOT provide these answers in any other form (eg. e-mail, etc).
Review Questions:
- x
- x
- x
- x
- x
- x
- x
- x
- Create a table listing each Linux command, useful options that were mentioned in the online assignment #1 and command purpose for the following Linux commands: scp , sftp , mail.