Tag: Linux
Protected: Processes for Working with Sensitive Information
There is no excerpt because this is a protected post.
Research Cluster NMR
This content is Onyen protected. Please enter your Onyen to log in and view it.
Mount.cifs from Linux terminal as normal user
This content is Onyen protected. Please enter your Onyen to log in and view it.
Perforce
This content is Onyen protected. Please enter your Onyen to log in and view it.
NMR Virtual Desktop
This content is Onyen protected. Please enter your Onyen to log in and view it.
Find Computer Serial Number
Many computer hardware vendors use the serial number to uniquely identify a system for the purpose of maintenance requests, warranty inquiries, etc. Typically the serial number can be found somewhere on the exterior of the case but here are a … Read more
Configure RHEL7
This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy. The following scripts can be used to configure the system. https://adminliveunc.sharepoint.com/sites/pharmacy/itsop/Downloads/rhel7_setup.zip Monthly … Read more
Connect to M Drive
This content is Onyen protected. Please enter your Onyen to log in and view it.
Getting Started on the Research Computing Cluster
Main help documentation: http://help.unc.edu/help/research-computing-getting-started/ Documentation / examples for invoking applications: http://help.unc.edu/help-tag/research-computing-services/ ITS Research Computing Services website: http://its.unc.edu/research-computing/ Resource utilization/billing reports: https://help.unc.edu/help/getting-started-on-killdevil/ Research Computing Training: http://its.unc.edu/rc-services/research-computing-training/ X-Win32 and SSH Secure Shell You will need SSH Secure Shell for accessing the server command line and transferring … Read more