lis654 lecture 1 introduction to the course, the ssh protocol thomas krichel 2012-01-22

89
LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

Upload: delphia-houston

Post on 25-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

LIS654 lecture 1

Introduction to the course, the ssh protocol

Thomas Krichel2012-01-22

Page 2: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

what's up doc?• This lecture is to introduce the topic of digital

libraries.• First part: we look at the nature of digital

libraries. This part is informed by the first chapter of Arms book.

• Second part: look at repository planning. This part is misinformed by the Reese and Barnarjee book.

• Then we talk ssh. A sorry excuse to play with wotan.

Page 3: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

first part contents

• digital libraries• digital librarianship• a course on digital libraries• with the aim of training digital librarians

Page 4: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

digital libraries

• Generally, we can think about digital libraries are – information stored on a computer– delivered via a network– mimics existing libraries

• As Arms puts it “a managed collection of information, with associated services, where the information is stored in digital formats and accessible over a network”.

Page 5: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

prospects

• We are at the start of digital libraries.• The problem is that the technology is still

expensive, the cost is still coming down.• The opportunity is that we can build

pioneering systems now, that will have a lasting social impact.

Page 6: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

example

• ISI journal citation report is based on two years of data of citations to journals.

• When Eugene Garfield founded it, he published the report in the second year of getting data.

• For the next issue, he chose the same horizon of data.

• Citation rankings of journals still use 2 years, almost 50 years after.

Page 7: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

benefits: availability

• Digital libraries bring the information closer to the user than physical libraries can– physically– temporarily

• Even when you are in the physical library you still get faster access to digital library items.

Page 8: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

benefits: findability

• Information can be more easily found in digital than in print.

• Some non-textual information is still only findable via metadata.

• But computer scientists are working on that.

Page 9: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

benefits: sharing

• Information can be shared.• Items can not be damaged.• Items can not be stolen.

Page 10: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

benefits: updating

• Information can be kept up-to-date more easily.

• To update a book, you have to reprint all copies, and replace them.

Page 11: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

benefits: new media

• Information can be created and manipulated in completely new ways.

• For example location information can be mixed up with subject information.

Page 12: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

issue: costs

• The cost of storing print information is very high. It is a multiple of acquisition costs.

• Digital storage devices decline in price.• But digital information manipulation requires

skills that are not easy to procure.• The overall cost comparison is difficult to

assess.

Page 13: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

drawback: preservation

• Preserving information is easy on paper.• Preserving digital information looks very hard. • We will not look at this issue in the course,

because there is a specialized Palmer School course dealing with this.

Page 14: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

drawbacks: monopoly dangers

• Since the information only needs to be kept in one copy, and others can access it, there are inherent dangers of the build-up of monopolies.

• One example is Google search engine.

Page 15: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

drawbacks: free information

• Since the information is more easy to copy it is harder to police illegal sharing.

• Some creators and intermediaries are feeling the pinch.

• The newspaper industry is one.• Physical libraries are one potential victim.

Page 16: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

drawbacks: professional upheaval

• Digital librarianship is as yet, largely undefined.

• This leads me to the next topic.

Page 17: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

digital librarianship

• Librarianship has always been a bicephal occupation.

• Libraries always have a collection and service aspect them.

• Digital libraries are no different.

Page 18: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

collection aspect

• The collection has to be managed and organized.

• The organizers deal with dead matter, documents.

• This organization is a scientific activity.• Librarianship is a natural science. • The librarian is a cataloger in a corner.

Page 19: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

service aspect

• Users have to be shown how the library works.• Librarians have to understand users’ needs to

build services users want.• All these are social activities.• Librarianship is a social science.• The librarian is a people service person.

Page 20: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

digital information was hard to use

• Computers had to be driven by esoteric commands.

• Screens were hard to read from. • Telephone lines where hard to get to work to

transmit information• Access costs to digital information was high.• The service aspect was important.

Page 21: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

digital information is becoming easier

• Computers are more and more easy to use.• Digital information providers tend to

communicate directly with customers, bypassing libraries.

• Subject literacy becomes relatively more important than information literacy.

• The service aspect is being reduced over time.

Page 22: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

an important caveat

• Most items in the modern (19th, 20th century) are mass-produced.

• There is no mass production or mass storage in the digital library.

• The difference between publishers, archives and libraries become very blurred.

Page 23: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

a course on digital libraries?

• My initial thought is that a course on digital libraries is nonsensical.

• In the recent future, all libraries will be digital.

Page 24: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

digital libraries course

• Literacy and use of digital media. • The idea is to look at what digital libraries exist

and how to use them. • This is really already done in LIS511.• The course has the “building” theme to it.

Page 25: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

building aspect

• Building a digital library can basically take three for– electronic resource management– repository building– cross-repository services

Page 26: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

electronic resource management

• Libraries license digital contents from providers and make them available.

• There are some minor technical issue– authentication– integration with ILS

• legal issues with the licensing• minor training issues with users

Page 27: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

repository building

• Libraries are building repositories of local digital or digitized contents.

• This is firmly on the technical side.• It is the main focus of the LIS654 course as it

has been developed in the past.• We cover digitization as part of repository

building.

Page 28: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

cross-repository services

• I think of repositories as publishers, rather than libraries.

• Digital libraries are cross-repository datasets and services attached to them.

• This is where I have done almost all my work.• It can not be done without custom computer

programming.

Page 29: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

course syllabus

• It draws on Brian Hoffman’s syllabus in for his Manhattan, Spring 2011 section.

• It is quiet non-technical. I will tune up the technology over the years.

• One can argue that without computer programming, one can not be a digital librarian.

• But most digital libraries fail because of non-technical issues.

Page 30: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

my expertise

• My main expertise is in setting up completely new open-access digital library services and collections.

• In non-technical terms, I can discuss how to set up these service and how they run.

• But I am reluctant to appear like a self-promoting pompous git.

Page 31: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

the wider environment

• Since 2008 I have been trying to build a special digital information concentration in the Palmer MSLIS program.

• The current version is at http://wotan.liu.edu/ home/proposals/wic.html.

• The LIS654 course is not part of the proposed concentration.

Page 32: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

second part: repository planning• This slide set follows Reese and Barnerjee very

closely. • We want to get through the gist of what they

have in chapters one and two. I skip the most trivial things as well as the stuff that will be covered in copyright and imaging lectures.

• I have not been involved in repositories but I don’t buy a lot what they write.

Page 33: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

planning• “The ultimate success or failure of a digital

repository is usually determined in the planning stage. A repository must be structured and organized that users can readily find and use diverse types of resources. It must be easy to maintain and capable of accommodating needs and resources that may not exist at the time the repository is designed.”

• Happy talk!

Page 34: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

planning importance• “The ultimate success or failure of a digital

repository is usually determined in the planning stage.”

• It would be useful to have an example of a repository that failed because it was badly planned.

• The weak contents in many academic repositories suggests that all are badly planned?

Page 35: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

search

• “A repository must be structured and organized that users can readily find and use diverse types of resources.”

• Users don’t search local repositories. They come in through search engines or aggregators (which are also found through search engines). Optimizing repositories for local findability is plain wrong.

Page 36: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

capability

• “capable of accommodating needs and resources that may not exist”

• It is impossible to do that. Making this sort of ideas a precondition for building a repository slows down progress with real task.

Page 37: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

parallel to physical

• “Creating and managing a digital repository is similar to starting a new physical collection … new materials must be added while those that no longer support the mission of the repository should be removed”.

• The first idea holds people hostage to the past and the second is inimical to digital preservation.

Page 38: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

preservation• “one of the primary functions of digital

repositories is to preserve electronic resources, though they must also provide a system for cataloging, indexing and retrieving digital materials”.

• We are still on page one, but have already a contradiction with statement of previous slide.

• “electronic resources” vs “digital materials”.

Page 39: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

missing here

• There needs to be an analysis done of the functionalities of the repository.

• Some of the aims of the repository may be contradictory.

• Then a prioritization can take place between these different functionalities.

• This will allow to select an appropriate software.

Page 40: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

“decision to build a digital repository”• “Although many people treat repositories as

short-term projects that can be funded with grants and other non-recurring monies, the reality is …”

• Building the repository will cost a lot.• Maintaining it is ok, if you have somebody on

staff who has minimum system administration skills and you can pay for external hosting and local backup.

• Comparing the repository to new physical collection is not helpful.

Page 41: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

role of the repository

• “The importance of physically processing resources is diminishing, and more value is placed on the ability to locate and download remotely stored resources. In this sense, digital repositories are a logical outgrowth of traditional library services in response to challenges brought by network technology.”

• discuss ;-)

Page 42: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

example 1 (born digital) offered by RB

• An example they point out is http://lcweb2.loc.gov/diglib/lcwa/html/elec2000/elec2000-browse.html

• This is well presented collection.• It seem to carry over coding mistakes from the

collection.• There does not appear to be a harvesting

interface.

Page 43: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

example 2

• Locally to them, they look at http://oregondigital.org/digcol/corflood64/

• This is a ContentDM based digital image collection.

• This really is an archival collection.

Page 44: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

opportunity for libraries

• Provide desktop access.• Present the library as au-fait with technology.• It is an occasion to set up skills. • Expand the remit of the library to publication

of locally produced materials. This latter point mainly applies to academic institutions but may be to others.

Page 45: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

problems with repositories

• Tools are not stable.• Migrations will be required.• User expectations are high (erh…)• Electronic resources are more difficult to work

with.• Staff adaptability or having enough competent

staff is the biggest challenge.

Page 46: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

repository purpose questions• What type of resources will it contain?• How big is it supposed to grow?• Who is going to use it and how?• How can resources be protected against

modification?• How will access and IP right be managed?• What systems will it see to interact with?• What resources will be available to create and

maintained it?

Page 47: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

expected use of the repository

• R&B say that you have to make expectations about the use of the repository.

• What you, in principle, need to think about is how do you organize searching and browsing.

• However in practice it turns out that you will only be able to do what the repository software will be able to do, unless you can change the software. Changing software can be a tall order.

Page 48: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

searching

• You usually have resources and their descriptions.

• The descriptions can be stored as BLOBs in a database.

• You need to extract the searchable from the descriptions to make them searchable in the database.

• Example: find pictures shot between 2011-04 and 2011-05.

Page 49: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

browsing• This is tougher.• Here the data has to be discrete.• Many times the same entity is referred to by

different values, e.g. “Thomas Krichel” vs “Томас Крихель”, “The Magic Flute” vs “Die Zauberflöte”.

• If you want to have browsing by author, composer, work etc, you to, most likely manually, bring variant from together.

Page 50: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

acquisitions• Since paper publishing is expensive, publishers

have to make exert some quality control. • For physical collections, libraries have

elaborate procedures. They have been evolving slowly for about 500 years.

• Libraries have catalogs, approval plans etc.• These are of little help with digital materials.• Most of the challenges of acquiring physical

continue for digital assets, R&B noted earlier.

Page 51: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

advice

• Another cerebral fart of R&B: “The value of a digital collection is measured by how well it helps people find what they need rather than by the number of items it contains.”

• They continue straight: “This means that to be useful, digital files must be selected and processed before they are stored.”

Page 52: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

developing the collection

• Putting in resources into the repository because they are there?

• Rely on content providers to provide them?• Rely on serendipity of library staff?

Page 53: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

R&B questions to answer

• What resources are desired and where are they?

• How will different versions of a document be handled?

• Who should be involved in the selection process?

• What tools exist to help automatically detect resources?

Page 54: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

fragmented resources

• “Acquiring resources for a digital repository is an inherently complex endeavor because it is often unclear what needs to be archive in the first place. Electronic resources frequently lack obvious boundaries.” – web pages– dynamically generated resources

Page 55: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

dealing with them• R&B suggest

– not include them?– reformatting them?– postpone dealing with them?– contracting out?

• The Internet Archive’s Heritrix is a software that can deal with the archiving of web pages.

• The reformatting of links in proprietary file formats may be more difficult.

Page 56: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

identification planning

• This is an important process of building archive.

• Anything that is considered a resource has to be given an identifier.

• Identifiers can be dumb or intelligent.• Identification may be hierarchical and it can

then be delegated. • [I am leaving R&B here.]

Page 57: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

dumb identifiers

• Dumb identifiers contain no information about the item that they are identify.

• For example a number can be used.• Advantages

– easy to create– no temptation to change

• Problem– not easy to relate to resource

Page 58: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

intelligent identifiers

• They say something about the resource.• Usually, any hierarchical identification

structure has some intelligence built into it. • But there is a temptation to change the handle

when there is a change in the intelligent matter that the handle is built on.

Page 59: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

Example from RePEc• The identification strategy was set by yours

truly.• It combine a centrally assigned archive code,

an series code assigned by the archive, and a code of the paper in the series.

• This is problematic when series move between archives.

• I tried to later have the series code to be centrally assigned.

Page 60: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

problem of handle instability

• If handles change, there are problems with all services based on them.

• For example if you have an announcement service, the paper appears to be new.

• If you have an author claiming service, the author appears to loose a paper and has to select the paper again.

Page 61: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

third part: ssh

• a bit about the computer • the Internet• ssh and our host• a brief discussion of the operating system of

the host

Page 62: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

a few words about a computer

• To use a computer you need to know something about its operating system (o/s).

• The o/s sets out how the computer behaves. • There are two o/s flavors that are widely used

– MS Windows (in various version)– UNIX-like operating system

• Our server runs an o/s called “Debian GNU/Linux”

Page 63: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

some generalities about Debian

• Debian is an open-source computer operating system developed and maintained by a large group of volunteer.

• Debian packages together a very large set of pieces of software into a coherent system.

• It provides a version of the UNIX operating system using Linux.

• The following notes hold for all (?) Unix flavor operating systems.

Page 64: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

files

• Files are continuous chunks data on disks that are required for software applications.

• Files have names.• Files have permissions attached to them,

discussed in "permissions model". • Files have times attached to them. Usually

the mtime (time of contents modification) is the only one shown.

Page 65: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

directories

• Directories are files that contain other files. Microsoft calls them folders.

• They have names, permissions and times like other files.

• In UNIX, the directory separator is “/”• The top directory is “/” on its own.

Page 66: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

links

• Links are files that contain the address of other files.

• In MS Windows, links are called shortcuts.• The times and permissions of links are kept

but they are of no importance.

Page 67: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

users and groups

• “root” is the user name of the superuser.• The superuser has all privileges.• There are other physical users, i.e. persons

using the machine• There are users that are virtual, usually

created to run a daemon. For example, the web sever in run by a user www-data.

• Arbitrary users can be put together in groups.

Page 68: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

permission model• Permission of files are given

– to the owner of the file– to the group of the file– and to the rest of the world

• A group is a grouping of users. Unix allows to define any number of groups and make users a member of it.

• The rest of the world are all other users who have access to the system. That includes www-data!

Page 69: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

user name & password

• To work with our server, you need a use name and a password.

• You can choose your user name as a short form of your own name.

• It should be all lowercases and can not have spaces.

• Please don’t choose an insecure password.

Page 70: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

the Internet• The Internet is an interconnected set of

physically disparate networks.• Each computer, when connected to the

Internet has an IP address. It's a four-byte number written as four decimal number from 0 to 255 connected by dots. Example: 148.4.2.231.

• Once a computer has an address, it can communicate with others using a protocol known as IP.

Page 71: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

Internet application protocols

• Once we have the Internet, we need protocols to work with it.

• They are called Internet application protocols.• Their king is the domain name system.• Two other protocol we will work with are http

and ssh.

Page 72: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

Domain Name System

• Domain Name System allows us to associate human-friendly names with IP addresses. These names are called domains names.

• Domain names can be leased from domain nate registrars.

• A machine with a domain name on the Internet is called a host.

• When we know the domain name of the host, we can communicate with the host.

Page 73: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

protocols to communicate with hosts

• There are two protocols we use in this class.– We use http to work with the omeka web

interface– We use ssh for some special operations.

• Both protocols are client/server protocols.• You run as ssh or http client on your local

machine.• You communicate with a machine that runs

ssh or http server software.

Page 74: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

the ssh protocol• ssh is protocol that uses public key

cryptography to encrypt a stream of communication between client and server.

• This allows us to privately manipulate the server. Or “manipulations” are really just changes to files on the server that contain our web pages.

• The ssh client software we use on the PC is called WinSCP. It is a file transfer program.

Page 75: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

our server• Is the machine wotan.liu.edu• We also say it is a “host” on the Internet. • wotan is the head of the gods in the Germanic

legend. The name has nothing to do with Chinese food.

• It is a humble PC.• It runs the testing version of Debian/GNU Linux.• It runs both http and ssh server software.• It is maintained by Thomas Krichel.

Page 76: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

the web site • As part of the course, you are being provided

with web space on the server wotan.liu.edu, at the URLhttp://wotan.liu.edu/home/user where user is a user name that you have chosen.

• This shows a list of available fails as prepared by the web server at wotan.

• This is a page that Thomas has prepared for you.

Page 77: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

ssh protocol

• The ssh protocol implements a secure connection to the server over which we can– send instructions to it– store files on it.

• wotan run an ssh server.• On your machines, you run ssh client

software.

Page 78: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

ssh client software

• On MS Windows machines, we run – putty for interactive use– WinSCP for file storage and retrieval.

• Usually, students in this class only need to understand WinSCP.

• On the Mac, you can use – Cyberduck– Fugu

• For interactive use on the Mac use Terminal.

Page 79: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

winscp• In winscp, the client that we use here most of

the time, we don't make advanced use of public keys, we simply give a password.

• Note that winscp does not establish a connection to wotan. It simply uses ssh as a means to transfer files.

• When winscp saves a file, it may require to open a new connection and will ask you the password again. This request may be in a window you can't immediately see.

Page 80: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

open a wotan session with winscp• If you see a list of session, click on “new session”.

– The host name is “wotan.liu.edu”.– Give your user name.– Click on “save”, this will save the session, after “ok”.

• You will be lead to the list of saved sessions, double-click to open a session.

• At initial connection, you will be shown a warning message that you can ignore.

• When saving or duplicating files, you may be asked to enter your password again. Watch out for that.

Page 81: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

home directory

• When your connection with wotan, and you have authenticated as a certain user, you will be shown your home directory.

• On wotan this is /home/user where user is your user name.

• There you see a bunch of files starting with a dot. Leave them alone.

• And you see a bunch of directories.

Page 82: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

initial files on wotan• A directory called public_html. This is your web

site. Everything you store there is on the web.• A set of files starting with a dot. They are

greyed out.• One of them is called .my.cnf. This an

initialization file for your mySQL client. We will not use the client, but we will store the password there.

• The file should be readable and writable by you only, no access to group other users.

Page 83: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

mySQL• mySQL is as implementation of a relational

database software. More about it later.• It uses its own permission system. That means

that it has a separate user/password space.• By Thomas’ decision, your mySQL username is

the same as your wotan user name. But Thomas does not know how to import your wotan password as your mySQL password. It has to be recorded separately.

• We use .my.cnf in your home directory.

Page 84: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

initial state of .my.cnf

1. # on line 4, replace your_password with your chosen mysql password

2. [client]3. user = your_user_name4. password = your_passsword

Page 85: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

web home directory• The web home directory is /var/www.• There you see a directory home, with a series

of links– they have a user name as file name – they go to your home/public_html directory

• There you see a directory omeka with a series of links– they have a user name as file name – they go to your omeka directory

Page 86: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

web site address• http://wotan.liu.edu/ goes to the /var/www

directory. There it shows the file index.html.• http://wotan.liu.edu/home/user goes to

the /var/www/home directory, where it finds the link to the public_html directory of the user user.

• In that directory, it will show the file index.html if it exists. Otherwise, it will build an index on the fly.

Page 87: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

backup

• This is more of a technical issue.• You will need backup. My general prescription

would be to run the repository itself with a 3rd party provider.

• Locally, keep a staging (rather than production) server and a backup. They can both be on the same machine.

• All this should be part of the sysadmin course.

Page 88: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

common-sensical sysadmin tips• You need physical security for any server.• You need to keep the software up-to-date. I do

it, roughly, weekly.• You need to join the mailing list for the

repository software, and the security list for the operating system.

• Encrypted access to the server when authentication is required.

• Run minimal amount of software.

Page 89: LIS654 lecture 1 Introduction to the course, the ssh protocol Thomas Krichel 2012-01-22

http://openlib.org/home/krichel

Please shutdown the computers whenyou are done.

Thank you for your attention!