Search5 Results
- Knowledge Base
- Research Computing
- Computing Cluster(s)
SSH keys allow for improved access to Research Computing clusters by bypassing the need for 2Factor authentication. Adding your public key to the cluster will allow tools such as ssh, putty and others to more quickly and easily connect.
- Knowledge Base
- Research Computing
- Computing Cluster(s)
SSH allows users to log in to Koko. Koko is our high performance cluster. Click here to read more.
- Knowledge Base
- Research Computing
- Computing Cluster(s)
Fluent is a fluid simulation software. There are multiple methods of using Fluent interactively. Click here to read more.
- Knowledge Base
- Research Computing
- Computing Cluster(s)
SSH allows users to log in to Koko to bypass two factor authentication. Koko is our high performance computing cluster. Click here to read more.
- Knowledge Base
- Research Computing
You may encounter a scary-looking warning from time to time if you use SSH to log into other systems. The warning itself is real: you should double-check to make sure that you're not connecting to an imposter/man-in-the-middle server. However, oftentimes within FAU, we'll upgrade computers, etc, causing the key for the computer to change, thus giving remote users the error. This article explains the steps to remove the warning for the known-"good" computer and establish a remote connection again