How to connect to the Unix host
Secure MethodsThe secure equivalent of telnet is ssh (secure shell). An ssh client will encrypt your communications with the remote server, protecting the information you exchange with that server. More importantly, it encrypts your username and password. If you use an insecure method like telnet or ftp, you run the risk of allowing hackers to "sniff" your password as you connect. With a secure connection method, password sniffing is impossible. Whenever you have a choice, always use a secure method to connect.
Most ssh clients also support something called scp (secure copy), which allows you to securely copy files from your computer to the server.
Use of these client programs depends on the server you are connecting to; the server must ALSO be running a ssh daemon program to encrypt communications on the server side. If you try one of these clients and it doesn't work, it may be that the server isn't running an ssh daemon. (Complain to your sysadmin.)
For more info on ssh, click here.
- PuTTY - a free Win32 Telnet/SSH Client
- Secure FTP
- TTSSH - an SSH extension to Teraterm Pro
- WinSCP - use this in lieu of FTP.
- MacSSH has both a ssh client and an sftp (secure ftp over ssh) client - you'll want to download both MacSSH and MacSFTP
- Nifty Telnet SSH supports ssh and scp.
Insecure MethodsThe following are insecure methods of connecting. Your username and password information (and everything you type while connected) are transmitted "in the clear", and are subject to being snooped on by hackers. It's dangerous and not recommended. If you want to connect securely, you should use one of the secure methods listed above.
- Connecting with NCSA Telnet
- FTPing with Fetch