Jump to content

Shell account: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
External links: why a link to one specific provider?
External links: dead link (form breaks on submission). an archive link of this nature would not be useful
Line 40: Line 40:


* [http://shells.red-pill.eu/ Shell providers list]
* [http://shells.red-pill.eu/ Shell providers list]
* [http://www.egghelp.org/shells.htm Egghelp.org's Shell Provider List]{{dl|date=January 2020}}<!-- search/list - Internal Server Error. Main page (egghelp.org) says that it's retired. -->





Revision as of 18:26, 2 August 2021

irssi IRC client running on a shell server

A shell account is a user account on a remote server, traditionally running under the Unix operating system, which gives access to a shell via a command-line interface protocol such as telnet or SSH.

Shell accounts were made first accessible to interested members of the public by Internet Service Providers (such as Netcom (USA), Panix, The World and Digex), although in rare instances individuals had access to shell accounts through their employer or university. They were used for file storage, web space, email accounts, newsgroup access and software development.[1][2][3] Before the late 1990s, shell accounts were often much less expensive than full net access through SLIP or PPP, which was required to access the then-new World Wide Web. Products such as The Internet Adapter were devised that could work as a proxy server, allowing users to run a web browser for the price of a shell account.[4]

Shell providers are often found to offer shell accounts at low-cost or free. These shell accounts generally provide users with access to various software and services including compilers, IRC clients, background processes, FTP, text editors (such as nano) and email clients (such as pine).[5][6] Some shell providers may also allow tunneling of traffic to bypass corporate firewalls.

See also

References

  1. ^ "Glossary". yossman.net. December 29, 1996. Retrieved 27 September 2010.
  2. ^ Michael K. Johnson (April 1996), "Choosing an Internet Service Provider", Linux Journal (24), Specialized Systems, Seattle, USA, ISSN 1075-3583, If you are comfortable with the command-line interface that Linux provides, you will probably be comfortable with a Shell account on a Linux or Unix computer managed by an ISP. Once your modem connects to the other modem and you log in, it is the same as an xterm session or a console login (without graphics capabilities) on your Linux box, except that the remote computer you are logged into is connected to the Internet. You usually use a standard Unix shell, with roughly the same choices available on your own Linux system, although some shell accounts also provide an optional menu interface similar to what a BBS provides.
  3. ^ Michael K. Johnson (October 1, 1994), "For Internauts, finding a port of call can be a trying experience. I recently ran the gauntlet of choosing a commercial Internet access provider (do I have enough mixed metaphors yet?) and would like to share my experiences, both good and bad.", Linux Journal, The other day, I started shopping, both for a Unix shell account, and for a SLIP or PPP connection that allows my home Linux network to become a real part of the Internet.
  4. ^ "The Web from a Unix shell account". Until recently, if you wanted to use Mosaic for the World Wide Web, you needed a direct SLIP or PPP connection to the Internet. In many countries, such a connection costs a leg and an arm. Now, you can also use Mosaic if you connect to the Internet through a Unix shell account. The administrators may not even notice that you do.
  5. ^ Cliff (July 14, 2004). "Unix Shell Accounts?". aks.slashdot.org. Retrieved 27 September 2010.
  6. ^ Bob Toxen (May–June 2007), "The Seven Deadly Sins of Linux Security", Queue, 5 (4), ACM, New York, USA: 38–47, doi:10.1145/1255421.1255423, ISSN 1542-7730, Most recent vulnerabilities are not directly exploitable remotely on most systems. This means that most systems are not at risk for remote attack from the Internet. Many of the vulnerabilities may be taken advantage of by someone with a regular shell account on the system.

Template:Z148