Overview
Web Clients
Links
- Links is a Text Based (Non GUI) Web Broser.
- Provided by the
elinks
package. - Full support for Frames and SSL.
Examples:
Wget
- The
wget
is a non-interactive network downloader. - Retrieves files via HTTP and FTP.
Options:
/-----------------------------------------------------------------------------------------------\ | | | --continue (-c) | Continue Partially Downloaded File | | | | --tries=number | Retry the specified number of times to download the files | | --wait=seconds | Wait the specified number of seconds between the retrievals | | | | --recursive | Turn on recursive retrieving | | --level=depth | Specify recursion maximum depth level | | | (The default maximum depth is 5) | | --convert-links | After download is complete convert all links, | | | To make them suitable for local viewing | | | \-----------------------------------------------------------------------------------------------/
Examples:
Google Chrome/Firefox
- Tabbed Browsing
- Popup Blocking
- Cookie Manageent
- Themes and Extensions
- Multi-Engine Search Bar
- Supports For Many Popular Plug-ins
Email and Messaging
Graphical Mail Clients
Evolution
- Flexible Email & Groupware Tool
- Used For
- Email Access
- Maintain a Calendar, Tasklist and Contacts Database
Thunderbird
- Standalone Mozilla Email Client
- Used For
- Email Access
- Usenet and RSS Supports
Security and Anti-spam Features:
-
Evolution and Thunderbird both support the Bayesian Spam Fileters.
- Evolution and Thunderbird both allows emails to be signed and encrypted.
- Evolution integrates supports for the GPG (GNU Privacy Guard) utility for this purpose.
- By Default, Thunderbird uses S/MIME for this purpose but use GPG with the help of the plugin called EnigMail.
Non-GUI Mail Clients
Mutt
- Mappable Hotkeys
- Highly Configurable
- Context Sensitive Help with ?
- Message Threading & Colorizing
- GNU Privacy Guard (GPG) Integration
- Supports POP, IMAP and LocalMailboxes
Examples:
- You Can Read One Mailbox (POP Account, IMAP Account or Local Mailbox) At A Time.
Note!: You Can Change Which Mailbox Mutt Viewed By Default, By Altering Its Configuration File ~/.muttrc
.
Open SSH - Secure Remote Shell
- SSH Allows Remote Logins & Remote Command Execution Via A Secure Encrypted Connections.
Syntax:
Examples:
scp - Secure File Transfer
- The
scp
works likecp
command. - The
scp
is a secure remote file copy program.
Syntax:
Examples:
rsync - Efficient File Sync
- The
rsync
is a faster thanscp
. - The
rsync
copies the difference in like files. - The
rsync
uses a secure ssh connections for transport the files. - The
rsync
is a fast, versatile, remote (and local) file-copying tool.
Examples:
Open SSH Keybased Authentication
- SSH Allows You To Authenticate Using The Private-Public Key Schema.
- Optional, Password less, But Still Secure Authentication
Uses Two Keys Generated By The ssh-keygen
- Private Key
- Private Key Stay On Your System
- Usually Passphrase Protected (Recommended)
- Public Key
- Public Key Is Copied To The Destination With
ssh-copy-id
- By Default
ssh-copy-id
copy the~/.ssh/id_rsa.pub
- Public Key Is Copied To The Destination With
Syntax:
Examples:
NOTE!: Older system may not have ssh-copy-id
command
Which will require you to manually copy your public keys to the destination system,
And append it to the ~/.ssh/authorized_keys
file, or create the file if it does not exist.
The ~/.ssh/authorized_keys
file must be readable by you. Otherwise ssh will ignore it.
Structure Of ssh-keygen
/---------------------------------------------------------------\ | | | identity Private 600 | | RSA1 | | identity.pub Public 644 | | | | ssh-keygen | | | | id_rsa Private 600 | | RSA | | id_rsa.pub Public 644 | | | | id_dsa Private 600 | | DSA | | id_dsa.pub Public 644 | | | \---------------------------------------------------------------/
Examples:
NOTE!: By Default ssh-keygen
Generates Protocol2 RSA Key Pairs.
ssh-agent
-
If you created your private key with a passphrase, which is highly recommended for the security reasons, Then whenever the key is used to connect to the other machines, you must type your passphrase.
- An Authentication Agent Stores The Decrypted Private Keys
- Thus, Passphrase only need to be entered once.
- In GNOME Authentication Agent is provided automatically.
- Otherwise, You will need to create a Agent-Managed Shell with ssh-agent command
- The Keys are added to the Agent with
ssh-add
command - If no filename is specified, The Keys stored in
~/.ssh/id_rsa
and~/.ssh/id_dsa
will be used - You can view the list of stored keys by running
NOTE!: When you are finished, Just type exit to return your original shell.
When the Agent is terminated, All your keys are forgotten.
FTP Clients
- Several FTP Clients are availables such as
sftp
,lftp
,lftpget
,gftp
and many more.
sftp
- Interactive Secure File Transfer Program.
- The sftp uses a secure ssh connections for transport the files.
lftp:
- More Featureful File Transfer Program.
Examples:
lftpget
- Non-interactive File Transfer Program.
Examples:
gftp
- Graphical File Transfer Program.
Applications -> Internet -> gFTP
- Allows Drag and Drop Transfer
- Anonymous or Authenticated Access
- Optional Secure Transfer vis SSH (sftp)
SMB Clients
- FTP Like Client To Access SMB/CIFS Resources On Server
- SMB Clients are used to access the shared resources on the MS Windows Network
Options:
File Transfer with Nautilus
- Nautilus are also used to access the remote file shares.
- Places -> Connect to Server
- Allows Drag and Drop File Transfer
- Graphically Browse With Multiple Protocols
- Suported Connection Types:
- SSH
- FTP
- SFTP
- WebDAV (HTTP)
- Secure WebDAV (HTTPS)
- Microsoft Windows Shares
Nautilus URL
Xorg Clients
-
One Of The Most Important Features Of Xorg Is Its Client/Server Architecture, That Makes Any Graphical Application On Linux System Completely Network Transparent.
- That Means You Can Start Any Graphical Application On The Remote System & That Application Displayed On The Local System.
- The Graphical Application Running In This Way
- Affects Files On The Remote System
- Take Up Resources (Cpu Cycles, Memory, Etc) On The Remote System
- And That Graphical Application Only Displayed On The Local System
Note!: All Graphical Applications Are X Clients & Connects To The Remote X Server Via TCP/IP
By Default, The Data Transfer Is Not Encrypted But Can Be Tunneled Securely Over An SSH Connection
Network Diagnostic Tools
ping
- Detects If It Is Possible To Communicate With Other Systems.
- Many System No Longer Respond To The Pings.
host
- DNS Lookup Utility.
- It is normally used to convert Hostnames to IP addresses and vice versa.
dig
- DNS Lookup Utility.
- Similar to host but greater in details.
netstat
- Provides a Number Of Network Statistics.
traceroute
- Display The List Of Computers(IP Addresses) Through Which The Packet Is Passed To Reach Their Destination.