For users of the Newton Lab workstations:
|
|
``Hey, it's Unix! I know this!'' - Lex, Jurassic Park |
Many of us folks who actually work with Unix a lot
rolled our eyes at this point in the movie. Lex
was using a mouse to move around and click on
graphical images on the computer screen, none of which
seemed to require any acquaintance with Unix.
In general, Unix computers may not have as good a graphical interface (windows, menus, folders, icons, etc.) as a Macintosh computer. But that's OK. We still tend to do different things on the Unix workstations than we would on a Mac/PC. Many times it's easier, or just as easy, to type a command as to fiddle with mouse/windows/menus. (Lines of distinction are becoming blurred -- new Macs actually are based on Unix, while the graphical interface of newer Linux versions are feeling more like other familiar systems -- and both can emulate Windows.) Anyway, the real strengths of Unix lie elsewhere. |
|---|
|
|
| The power of the basic Unix commands increases tenfold when combined with the succinct Unix syntax. The output from one command can be directed into a new file, or appended to an existing file, or passed along as input to another command. Wildcard characters let you specify multiple files. The semicolon separates multiple commands on a single line, and you can define your own simple aliases for often-used long Unix commands, in the special file .cshrc (located in your home directory). Also in .cshrc is the definition of your ``search path'' and other important system variables. |
|---|
|
|
Traditionally, you could connect to other computers
using telnet and rlogin and (for transferring
files from one computer to another) ftp. All
three programs, however, are insecure; crackers (malicious
hackers) can and do have programs that can intercept network
traffic -- including passwords -- which then enables
them to log on to computers and do malicious hacking in
somebody else's name.
The Applied Math computers, like most computers on campus, have been hacked into now and then, which is why we now disallow (or at least discourage) the use of telnet & rlogin & ftp. Instead, secure versions are available: ssh and scp. These replace telnet and ftp, respectively, and cleverly encrypt/decrypt outgoing and incoming communications so that any hacker's ``sniffer program'' will hear only gibberish. Examples of usage: |
|---|
|
|