1 00:00:00,330 --> 00:00:05,670 All right, now it's time to copy files or more files over the network. 2 00:00:05,880 --> 00:00:13,140 OK, so, for example, I have this fight here, so it's created file over network, for example. 3 00:00:13,950 --> 00:00:14,340 Anything. 4 00:00:14,340 --> 00:00:15,160 It doesn't matter. 5 00:00:15,420 --> 00:00:18,750 OK, now let's equal or put this inside it wall. 6 00:00:20,000 --> 00:00:27,140 I find anything using that action fight over the network and it's catted to check if it is. 7 00:00:27,530 --> 00:00:28,880 Yeah, except that yeah. 8 00:00:28,910 --> 00:00:38,030 So this fight over the text has a fight and I want to send it to a specific server that I have access 9 00:00:38,030 --> 00:00:38,360 on. 10 00:00:38,360 --> 00:00:41,330 I have a set key connected, whatever. 11 00:00:41,360 --> 00:00:44,310 OK, so for that I would use the ACP command. 12 00:00:44,420 --> 00:00:44,850 All right. 13 00:00:45,140 --> 00:00:49,790 So by the way, I have this fight here or I have this server, I have access on it. 14 00:00:50,270 --> 00:00:55,890 So over this set, I mean, so OCB actually which means secure copy. 15 00:00:56,110 --> 00:01:01,950 OK, and this command used or you understood it use excessive ekis. 16 00:01:02,270 --> 00:01:10,610 OK, so the first thing I Sipi actually it worked exactly like the Kabukiman so source to destination. 17 00:01:10,700 --> 00:01:17,460 OK, so the source it will be just for me for now the source it will be fired over. 18 00:01:17,480 --> 00:01:23,030 And what by the way, it work from source to destination, which means that you can copy files from 19 00:01:23,030 --> 00:01:29,480 here by the way, so you can get a copy, for example, remoting the job from here from this server 20 00:01:29,510 --> 00:01:36,830 remote server to your local machine by by providing the Bethia and providing the destination as your 21 00:01:36,830 --> 00:01:39,460 computer or your location on your computer. 22 00:01:39,620 --> 00:01:40,940 But how to do that? 23 00:01:41,340 --> 00:01:42,970 Don't worry for me for now. 24 00:01:43,190 --> 00:01:45,590 So ocb file over the text. 25 00:01:46,050 --> 00:01:51,980 This is the source which is the file that I have I have located then the destination. 26 00:01:51,980 --> 00:01:57,440 It will be then the remote user, which is in my case, Ubuntu. 27 00:01:58,520 --> 00:02:05,450 As you can see, I am providing that user on that remote machine at and I will provide the IP address 28 00:02:05,450 --> 00:02:08,840 of it, by the way, I have it as a private server. 29 00:02:09,380 --> 00:02:11,570 Yeah, you can see that this is the user. 30 00:02:12,550 --> 00:02:18,600 I have here I have access one which is open to act, which is the IP address of the set of that server, 31 00:02:18,850 --> 00:02:25,420 then I would put the curtain here, OK, the curtain here means that this is the server now inside the 32 00:02:25,420 --> 00:02:25,900 server. 33 00:02:25,930 --> 00:02:30,170 What is the path which is slash home slash Ubuntu. 34 00:02:30,190 --> 00:02:31,210 How did I know that? 35 00:02:31,210 --> 00:02:33,140 It's nobody just type Baudier. 36 00:02:33,330 --> 00:02:35,040 Let's see that home Ubuntu. 37 00:02:35,320 --> 00:02:39,820 So I want this fight, which is the fight over the network to be Cobbett there. 38 00:02:40,120 --> 00:02:44,100 So Ubuntu at this home I want to slash. 39 00:02:44,250 --> 00:02:47,090 So which means that this file will be copied there. 40 00:02:47,270 --> 00:02:47,710 All right. 41 00:02:47,720 --> 00:02:48,270 So far, so good. 42 00:02:48,370 --> 00:02:49,780 By the way, don't forget the slash. 43 00:02:50,080 --> 00:02:56,790 If you didn't specify the slash, this file will be renamed Open-top and it will be on the home directory. 44 00:02:56,920 --> 00:02:58,580 So the slasher is very crucial. 45 00:02:58,840 --> 00:03:04,000 So this means that it is inside the home, inside the Ubuntu directory. 46 00:03:04,210 --> 00:03:07,470 Then we will have this file, the same name as here. 47 00:03:07,630 --> 00:03:12,610 But if I provide a new name, underscore in the text. 48 00:03:14,180 --> 00:03:19,370 This time it will be copy there as this name, which is the new name, the text. 49 00:03:19,390 --> 00:03:20,900 OK, so let's have that. 50 00:03:21,110 --> 00:03:23,570 By the way, this is the same thing for the copy. 51 00:03:24,540 --> 00:03:30,430 If you want to change the name, we already saw that, by the way, but that we didn't mention the last 52 00:03:30,480 --> 00:03:33,820 thing because this thing is very important and very crucial. 53 00:03:34,140 --> 00:03:39,660 So if I type the name of the fight, it will be copied and renamed with the new name. 54 00:03:40,200 --> 00:03:46,350 But if I didn't provide the name, which means only this like this, this will be copied as is and the 55 00:03:46,350 --> 00:03:49,320 default name would be the original name, which is fine over there. 56 00:03:49,860 --> 00:03:50,970 But that's what new. 57 00:03:52,500 --> 00:03:53,710 The text, OK? 58 00:03:54,600 --> 00:03:58,290 All right, now, express that, by the way, it would not work like this. 59 00:03:59,570 --> 00:04:00,600 You know why? 60 00:04:00,820 --> 00:04:06,130 Because we forgot to provide something, by the way, because I am using a key based authentication 61 00:04:06,130 --> 00:04:10,350 here, not a password based, which means it will not ask me for a password. 62 00:04:10,510 --> 00:04:14,080 I need to provide the I the dash I option. 63 00:04:15,490 --> 00:04:23,820 Which is the identifier, for example, and I need to provide the key for all the private as is key, 64 00:04:23,860 --> 00:04:30,820 so I can send the fight or what, actually, I'm assuming that you are familiar with this is such a 65 00:04:31,180 --> 00:04:33,490 behavior anyway, so. 66 00:04:34,540 --> 00:04:42,520 I have it here, actually, now you can see that it is it has been moved or covid-19 over then it completely 67 00:04:42,520 --> 00:04:46,990 with our under a secured tunnel, which is that a such tunnel, by the way? 68 00:04:46,990 --> 00:04:48,040 I'm using again. 69 00:04:48,040 --> 00:04:54,570 And this key, this is that the key or the secret and private key. 70 00:04:55,210 --> 00:05:02,050 So if I return here, if I press and yes, I can see oh I can see it here, which is the new name. 71 00:05:02,200 --> 00:05:05,740 Now if I type in, you name the text will a fight which is. 72 00:05:06,580 --> 00:05:08,470 Yeah, it moved quite correctly. 73 00:05:08,470 --> 00:05:13,070 So actually let's copy this fight and this time listening to whatever. 74 00:05:14,840 --> 00:05:16,880 Which is on. 75 00:05:18,010 --> 00:05:25,060 Silver underscored by the text, so this is the distinguish between them and this fight, this time 76 00:05:25,060 --> 00:05:27,780 it's open by them and its content. 77 00:05:28,210 --> 00:05:30,310 It's what it's something else. 78 00:05:30,970 --> 00:05:35,850 What I'm trying to do, actually, is I want to copy from the silver to the localhost, OK? 79 00:05:35,860 --> 00:05:38,370 I just want to show you how to do such a thing. 80 00:05:39,100 --> 00:05:42,110 By the way, if I did, it will delete a complete line. 81 00:05:42,850 --> 00:05:45,340 So this is in the server. 82 00:05:47,590 --> 00:05:51,250 OK, so let's save that ADC now. 83 00:05:51,250 --> 00:05:54,550 This time I would use the same command, but this time I want to. 84 00:05:55,030 --> 00:05:55,420 What? 85 00:05:55,780 --> 00:05:57,030 Yeah, you guessed right. 86 00:05:57,040 --> 00:05:58,540 I want to flip them out. 87 00:05:58,810 --> 00:06:01,600 So I want to look at this, whatever, blah blah blah. 88 00:06:01,600 --> 00:06:08,680 And this thing, by the way, you need to change the name and this will be considered the source, which 89 00:06:08,680 --> 00:06:14,050 means that the source I want it from this, which means I want to add something by providing, by the 90 00:06:14,050 --> 00:06:19,360 way, that I don't forget, providing the dashi we already so that we don't need to go over it again. 91 00:06:19,600 --> 00:06:25,300 So open to at whatever ebe this and its place is on this server. 92 00:06:25,300 --> 00:06:28,480 I mean on the server with this, with this credentialled this user. 93 00:06:28,870 --> 00:06:33,070 I want to go home, I want to not Emunim this time it will be what. 94 00:06:33,990 --> 00:06:37,500 Which is the new name we have it here, which is this could be it, it's no big deal. 95 00:06:38,940 --> 00:06:45,700 Like this and the destination, it will be my local machine, which is here, I can provide just slash, 96 00:06:45,780 --> 00:06:51,570 which means that what this button on the current directory, which is the test. 97 00:06:51,820 --> 00:06:53,890 Now, let's do that and see if it is working. 98 00:06:54,480 --> 00:06:56,670 Yeah, it worked 100 percent. 99 00:06:56,670 --> 00:06:59,540 And yeah, we have it here, which is got unseeable. 100 00:06:59,730 --> 00:07:04,560 You can see that this is in the server, quite everything worth one hundred percent. 101 00:07:04,800 --> 00:07:09,300 But again, I'm assuming that you are familiar with the SS Keys. 102 00:07:09,330 --> 00:07:11,700 Osiecki Beyer's sickies. 103 00:07:11,730 --> 00:07:12,090 What. 104 00:07:12,510 --> 00:07:14,220 How to modify that. 105 00:07:14,220 --> 00:07:15,150 How to configure that. 106 00:07:15,180 --> 00:07:16,680 OK, thanks for watching.