Soifyou'regonnabeconnectingto a machinewithremotedesktop, themachinehastobein a solid, fast, stableconnection, andyou, as a client, havetobein a solid, fast, stableconnection.
Ifthatisnotthecase, usingremotedesktoponbadInternetconnectionscouldbe 00 such a treat, right?
That's oneofthereallynicethingsaboutusingSSAgentisoneofthereasonswhy a lotofpeople a lotoftechnicians, prefertouseLennoxoverWindowsmachines, especiallywhentheyhavetoadministersystemsremote, likesimplybecauseitisliterallysoeasytoaccessthesemachines.
Yourserveractuallyhastohavethe s s a serversoftwareinstalled, andyouhavetouse a clientpieceofclientsoftwaretobeabletoconnecttothatserversoftware.
Sowestarttalkingaboutclientsagain.
I useMacosso s s H clientisactuallybuiltintotheMacOSterminal, so I cansimplyopenup a terminaltypeessayspaceandtheconnectiontoconnecttotheserveronamableabletointeractwith a serverthatway, connectover S s A.
Ifyou'reusingWindows, youmayhavetouse a WindowsSsshclient.
Sobackintheday, I usedtouseputty.
Oh, there's a wholemetriccraptonofclientsoutthere.
ButyoudohavetoyouhavetheSSAIsoftwaretobeableconnecttotheserver, evenevenagain, evenifyouhave a smartphone.
Truly.
10 yearsago, backinthedaywhen I hadmyLennoxserversittingecholocationfacilityonaniPhonethreeGs, ifyourememberwhatInternetconnectionsofmobilephoneswerelikebackintheday, theywerereallyhorrible.
Butthefactofthematteris, is I actuallyhadanSS H clientappinstalledonmyoldiPhonethreegs, and I wasabletodofulladministrationusingthatiPhonethree.
Yes, becauseagain, allit's sendingbackistext.
Sotheimportantthingtorememberaboutsshhisthis?
Thesoftwarehastobeinsultontheserver, andyouhavetobeabletouse a clienttobeabletoconnecttoit.
Asfaraswithourlittletestlabdemolab, where I'm showingyouhowtodothesethings, evenonvirtualboxoftheseventiesthat I hadtochangeactuallygointothenetworksettingsfortheparticularvirtualmachinethatwe'reusing.
And I actuallyhadtomodifythosesothatmyhostsystemwasabletoconnecttothe I.
P addressofthevirtualmachine, theLenoxvirtualmachinethatwe'reusing.
Youdothatkindofbasicstuff, buttogettothispoint, youshouldhave a reasonableunderstandingofhowbasicnetworkingworksbecauseagainyoucanhavetheyou'regonnahave a server.
Youcanhave a client, butyoucan't talktoeachotherliterally.
Whetheryou'reLennoxboxishalfwayaroundtheworldorifit's literallyjustsittingin a roomin a coupleofcoupleoffeetawayfromyou, thisis a waythatyoucancontrolandinteractwiththosesystems.
Sothereyougo.
I'm showingyouhowtouseSsshonLenoxServer.
I showedyouhowtoinstalltheSS A servercomponentsontoOlynykServeragain.
I'veshownyouhowtobeabletoconnecttotheSS a serverusingtheterminalfromMacOS, becauseagain, sshhisbuiltintothenand I showedyoutheoptionsforthewindowsystemsagain.
Intherealworld, I useputty, but I'm surethatcanstart a wholebunchofargumentsouttherenow.
Oneofthings.
I willtellyouoneofthereasonswhy I s S H ismanytimesnotinstalledbydefaultontoLennoxSystemsisbecauseitcanbe a vulnerabilityforwhatarecalledofbruteforceattacks.
Sowhatbruteforceattacksare?
Thehackingworldiswe'reessentiallyhackers.
Justsend a countlessnumberofdifferentusername, passwordcombinationstryingtofigureoutifanyofthemwork.
Soespeciallyifyouuse a weekusername a weakpasswordssuchas 123456 There's a goodchanceofsomebodydoes a bruteforceattackagainstyoursystemfor S s A Theymaybeabletogetin, anditiskindofamazing.
Likeifyoueverlookatlogs, it's amazinghowmanytimeswewilltrytologininthe S S sake, especiallyifyou'rethey'reusingsomekindofbahtorsomekindofautomatedsystem.
Nowthereissecurityoutthere.
TherearethereisdifferentsoftwareyoucaninstallintoyourLennoxsystemthatwillbasicallyjustfailoutfor a walkandsshhaccountorserviceaftersomanyfailedloginattempts.
Thisisthisiswhywetakeallofthesesmalllittlecomponentsandtechnologyandthenwebuildthemtogethertocreate a productionsystemto.
ThefirstthingisyoucreatetheLenoxServer, andoncehecreatedoneexserver, yourealize, Oh, I mightneedtoremotelyadministertheLenoxserver.
Sothenyouinstallesosake, buttheythink, Oh, I wanttoprotectit.
Sothenyoudothingssuchasuse u f w usethebuiltinfirewallandthenyoustartyou.
Thenyoudealwithnetworking.
Thenyoustartdealingwithalloftheseotherthingstofigureoutthebestwaytogiveyouaccesstoyourownsystemwhilealsopreventingthatthehackersfrombeing a biggainaccess.