Difference between revisions of "Tutorial6: File Transfer / Sending Email Messages"
(→KEY CONCEPTS) |
(→KEY CONCEPTS) |
||
Line 49: | Line 49: | ||
In this tutorial, you will learn several different methods to securely transfer files from your Matrix Linux account to other computers using Linux commands including '''scp''', '''sftp''' and '''mail'''. | In this tutorial, you will learn several different methods to securely transfer files from your Matrix Linux account to other computers using Linux commands including '''scp''', '''sftp''' and '''mail'''. | ||
− | ===Secure Copy=== | + | ===Secure Copy (scp)=== |
x | x | ||
− | ===Secure File Transmission Control Protocol=== | + | ===Secure File Transmission Control Protocol (sftp)=== |
x | x | ||
− | ===Sending Emails ( | + | ===Sending Emails with Attachment (mail)=== |
x | x |
Revision as of 07:37, 27 January 2020
Contents
TRANSFERRING FILES / USING THE MAIL COMMAND
Main Objectives of this Practice Tutorial
- List common utilities combined with the ssh suite of utilities
- Securely copy files between Unix/Linux servers using the scp command
- Securely transfer copies of files between Unix/Linux servers using the sftp command
- Use the mail command to send email messages to your Seneca email account
- Use the mail command to send email with file attachments to your Seneca email account
Tutorial Reference Material
Course Notes |
Definitions / Commands |
YouTube Videos | ||
Course Notes: | Definitions: | File Transfer Commands: | Instructional Videos:
|
KEY CONCEPTS
The ssh Linux command is actually a suite of tools to allow the user to not only issue commands securely between Unix / Linux servers, but also securely copy and transfer files among Unix/Linux servers via the commands scp and sftp.
In this tutorial, you will learn several different methods to securely transfer files from your Matrix Linux account to other computers using Linux commands including scp, sftp and mail.
Secure Copy (scp)
x
Secure File Transmission Control Protocol (sftp)
x
Sending Emails with Attachment (mail)
x
INVESTIGATION 1: USING SECURE COPY
In this section, you will learn how to ...
Perform the Following Steps:
- x
In the next investigation, you will ...
INVESTIGATION 2: USING SECURE TRANSMISSION CONTROL PROTOCOL
In this section, you will learn how to ...
Perform the Following Steps:
- x
In the next investigation, you will ...
INVESTIGATION 3: USING THE MAIL COMMAND
In this section, you will learn how to ...
Perform the Following Steps:
- x
LINUX PRACTICE QUESTIONS
The purpose of this section is to obtain extra practice to help with quizzes, your midterm, and your final exam.
Here is a link to the MS Word Document of ALL of the questions displayed below but with extra room to answer on the document to simulate a quiz:
https://ict.senecacollege.ca/~murray.saul/uli101/uli101_week6_practice.docx
Your instructor may take-up these questions during class. It is up to the student to attend classes in order to obtain the answers to the following questions. Your instructor will NOT provide these answers in any other form (eg. e-mail, etc).
Review Questions:
- x
- x
- x
- x
- x
- x
- x
- x
- Create a table listing each Linux command, useful options that were mentioned in the online assignment #1 and command purpose for the following Linux commands: scp , sftp , mail.