Computer Science and Statistics

College of Arts and Sciences

Technical References

Email Setup

While the webmail interface is fine as quick way to check your email from anywhere, you are encouraged to setup a real email client, such as Thunderbird for your regular usage.

HowTo: .htaccess

When you are creating or expanding your webspace under pubic_html, an .htaccess file might provide some additional flexibility and functionality, such as requiring a password for a certain directory or enabling CGI programs in one directory while disabling them in others. General Instructions First off, it is worth clarifying a potentially confusing notion. .htaccess is(…)

HowTo: Change Passwords

If you need/want to change your password at any point, you may do so. Changing your Password Login to london (see Howto:SSH) you may use cspasswd in order to change your password: auser@london ~ $ cspasswd Identity validation… Enter your UNIX password: Changing UNIX and samba passwords for auser Enter login(LDAP) password: New password: Retype(…)

HowTo: Control Spam

The department servers use Spamassassin and Procmail in the mail delivery process. You can control how these programs work by editing the user configuration files for each. Spam Assassin’s user configuration file is ~/.spamassassin/user_prefs Procmail’s user configuration file is ~/.procmailrc Please note that Procmail is called after Spam Assassin, which is why you can filter(…)

HowTo: Forward Email

You may forward your e-mail from to any other account. It’s simple and can be set up within moments. The existence of a file in your CS home directory called .forward controls where your e-mail will be forwarded to. If the file doesn’t exist or is empty, then your e-mail will not get forwarded.(…)

HowTo: GPG

If you wish to sign your e-mails with a security key (and be able to read key-guarded messages), then you may utilize the GNU Privacy Guard (GPG). Creating a Key First, log in to the CS network with a Linux terminal. jdoe@london ~ $ gpg –gen-key The program will ask you a few simple questions:(…)

HowTo: Mailing List

Official student emails are automatically added to the department email list at the start of each semester. Transfer students or new students enrolling in the Spring may subscribe their email addresses to the mailing list early at the link below. The subscription page is only accessible from department Lab computers or at the Kiosk in(…)

HowTo: Printing

Printing is a available from computers in the Main Lab (Room 055) and the Graphics Lab (Room 053). A printer is available for graduate students in the second floor graduate suite. Computers connected to the CS network can add this printer using the name using wired or wireless access. Printing is not available from(…)

HowTo: PuTTy

PuTTY, being the flexible tool that it is, can be used to connect from a Windows-based computer to other computers through SSH as well as other protocols. This Howto will help you utilize PuTTY so that you can connect to the CS network with ease. Startup Go ahead and open PuTTY. You will be presented(…)

HowTo: RSA Keys

Making the Key On either or ssh-keygen -t rsa You will then see Generating public/private rsa key pair. Enter file in which to save the key (/home/ugrad/auser/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/ugrad/auser/.ssh/id_rsa. Your public key has been saved in /home/ugrad/auser/.ssh/ The(…)

HowTo: SCP

Like SSH, one may use Secure Copy (SCP) in order to remotely connect to a computer. The major difference between SSH and SCP is that while SSH allows a user to manipulate a computer through a terminal, SCP allows a user to transfer files to and from said computer. All CS students may transfer files(…)

HowTo: SSH

One may use Secure Shell (SSH) in order to remotely connect to other computers running the SSH daemon. All CS students may remotely connect to the network in this fashion. It is relatively easy to connect to a server regardless of what operating system you are using. For the purposes of this Howto, we(…)

Using Your Keys in Linux

From the machine on which you made your key: scp ~/.ssh/ Install the key: ssh cp >> ~/.ssh/authorized_keys logout Alternatively, if your machine provides ssh-copy-id, you only need to: ssh-copy-id Test the key: ssh Authenticating with public key “imported-openssh-key” Passphrase for key “imported-openssh-key”: Last login: Mon May 15 21:36:19(…)

Using Your Keys in Windows

You will need puttyGen to make your key in Windows. You may either: Transport the key: Using scp copy ~/.ssh/id_rsa to your Windows machine. Or Make the key: Run the puttyGen program Hit “Load” Set to “All Files(*.*)” Navigate to the id_rsa file you transphered over before and select the file Hit “Open” Enter the(…)

Think Big We Do

Copyright © 2019 University of Rhode Island.