<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.xmission.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pashdown</id>
	<title>XMission Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.xmission.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pashdown"/>
	<link rel="alternate" type="text/html" href="https://wiki.xmission.com/Special:Contributions/Pashdown"/>
	<updated>2026-05-19T10:53:00Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Wiki:General_disclaimer&amp;diff=11991</id>
		<title>XMission Wiki:General disclaimer</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Wiki:General_disclaimer&amp;diff=11991"/>
		<updated>2025-03-26T20:12:01Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: adjust link and this is not an archive&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;XMission Wiki is offered as a documentation tool for employees and subscribers of XMission.  Best efforts are made to ensure the accuracy of the information, yet there remains no guarantee on information contained within.  Because subscribers may edit information, XMission can not be held directly responsible for all content of this Wiki.&lt;br /&gt;
&lt;br /&gt;
Please refer to the [https://xmission.com/about/aup XMission Policy] for further details.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Wiki:About&amp;diff=11989</id>
		<title>XMission Wiki:About</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Wiki:About&amp;diff=11989"/>
		<updated>2025-03-26T02:51:59Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: link to xmission.com &amp;quot;Our Story&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://xmission.com/our_story The XMission Story]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Wiki:Privacy_policy&amp;diff=11986</id>
		<title>XMission Wiki:Privacy policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Wiki:Privacy_policy&amp;diff=11986"/>
		<updated>2025-03-26T02:50:20Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: link to external xmission.com Privacy Pledge&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://xmission.com/privacy-pledge Privacy Pledge]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=MediaWiki:Privacy&amp;diff=11983</id>
		<title>MediaWiki:Privacy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=MediaWiki:Privacy&amp;diff=11983"/>
		<updated>2025-03-26T02:49:51Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: rename&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Privacy Pledge&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=MediaWiki:Privacy&amp;diff=11980</id>
		<title>MediaWiki:Privacy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=MediaWiki:Privacy&amp;diff=11980"/>
		<updated>2025-03-26T02:48:31Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: link to main xmission.com Privacy Pledge&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://xmission.com/privacy-pledge Privacy Pledge]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=MediaWiki:Privacy&amp;diff=11977</id>
		<title>MediaWiki:Privacy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=MediaWiki:Privacy&amp;diff=11977"/>
		<updated>2025-03-26T02:47:20Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: Privacy Pledge&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Privacy Pledge&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Wiki:General_disclaimer&amp;diff=11971</id>
		<title>XMission Wiki:General disclaimer</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Wiki:General_disclaimer&amp;diff=11971"/>
		<updated>2025-03-26T02:34:12Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: not archived&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;XMission Wiki is offered as a documentation tool for employees and subscribers of XMission.  Best efforts are made to ensure the accuracy of the information, yet there remains no guarantee on information contained within.  Because subscribers may edit information, XMission can not be held directly responsible for all content of this Wiki.&lt;br /&gt;
&lt;br /&gt;
Please refer to the [http://www.xmission.com/about/aup XMission Acceptable Use Policy] for further details.&lt;br /&gt;
&lt;br /&gt;
[[Category:Archives]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Test&amp;diff=11905</id>
		<title>Test</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Test&amp;diff=11905"/>
		<updated>2025-03-26T01:19:38Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: Text replacement - &amp;quot;&amp;lt;/source&amp;gt;&amp;quot; to &amp;quot;&amp;lt;/syntaxhighlight&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
/**&lt;br /&gt;
 * This is the main web entry point for MediaWiki.&lt;br /&gt;
 *&lt;br /&gt;
 * If you are reading this in your web browser, your server is probably&lt;br /&gt;
 * not configured correctly to run PHP applications!&lt;br /&gt;
 *&lt;br /&gt;
 * See the README, INSTALL, and UPGRADE files for basic setup instructions&lt;br /&gt;
 * and pointers to the online documentation.&lt;br /&gt;
 *&lt;br /&gt;
 * http://www.mediawiki.org/&lt;br /&gt;
 *&lt;br /&gt;
 * ----------&lt;br /&gt;
 *&lt;br /&gt;
 * Copyright (C) 2001-2011 Magnus Manske, Brion Vibber, Lee Daniel Crocker,&lt;br /&gt;
 * Tim Starling, Erik Möller, Gabriel Wicke, Ævar Arnfjörð Bjarmason,&lt;br /&gt;
 * Niklas Laxström, Domas Mituzas, Rob Church, Yuri Astrakhan, Aryeh Gregor,&lt;br /&gt;
 * Aaron Schulz, Andrew Garrett, Raimond Spekking, Alexandre Emsenhuber&lt;br /&gt;
 * Siebrand Mazeland, Chad Horohoe, Roan Kattouw and others.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is free software; you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation; either version 2 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 *&lt;br /&gt;
 * You should have received a copy of the GNU General Public License along&lt;br /&gt;
 * with this program; if not, write to the Free Software Foundation, Inc.,&lt;br /&gt;
 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.&lt;br /&gt;
 * http://www.gnu.org/copyleft/gpl.html&lt;br /&gt;
 *&lt;br /&gt;
 * @file&lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
# Bail on old versions of PHP.  Pretty much every other file in the codebase&lt;br /&gt;
# has structures (try/catch, foo()-&amp;gt;bar(), etc etc) which throw parse errors in&lt;br /&gt;
# PHP 4. Setup.php and ObjectCache.php have structures invalid in PHP 5.0 and&lt;br /&gt;
# 5.1, respectively.&lt;br /&gt;
if ( !function_exists( &#039;version_compare&#039; ) || version_compare( phpversion(), &#039;5.&lt;br /&gt;
3.2&#039; ) &amp;lt; 0 ) {&lt;br /&gt;
	// We need to use dirname( __FILE__ ) here cause __DIR__ is PHP5.3+&lt;br /&gt;
	require( dirname( __FILE__ ) . &#039;/includes/PHPVersionError.php&#039; );&lt;br /&gt;
	wfPHPVersionError( &#039;index.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Initialise common code.  This gives us access to GlobalFunctions, the&lt;br /&gt;
# AutoLoader, and the globals $wgRequest, $wgOut, $wgUser, $wgLang and&lt;br /&gt;
# $wgContLang, amongst others; it does *not* load $wgTitle&lt;br /&gt;
if ( isset( $_SERVER[&#039;MW_COMPILED&#039;] ) ) {&lt;br /&gt;
	require ( &#039;phase3/includes/WebStart.php&#039; );&lt;br /&gt;
} else {&lt;br /&gt;
	require ( __DIR__ . &#039;/includes/WebStart.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
$mediaWiki = new MediaWiki();&lt;br /&gt;
$mediaWiki-&amp;gt;run();&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=php&amp;gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
/**&lt;br /&gt;
 * This is the main web entry point for MediaWiki.&lt;br /&gt;
 *&lt;br /&gt;
 * If you are reading this in your web browser, your server is probably&lt;br /&gt;
 * not configured correctly to run PHP applications!&lt;br /&gt;
 *&lt;br /&gt;
 * See the README, INSTALL, and UPGRADE files for basic setup instructions&lt;br /&gt;
 * and pointers to the online documentation.&lt;br /&gt;
 *&lt;br /&gt;
 * http://www.mediawiki.org/&lt;br /&gt;
 *&lt;br /&gt;
 * ----------&lt;br /&gt;
 *&lt;br /&gt;
 * Copyright (C) 2001-2011 Magnus Manske, Brion Vibber, Lee Daniel Crocker,&lt;br /&gt;
 * Tim Starling, Erik Möller, Gabriel Wicke, Ævar Arnfjörð Bjarmason,&lt;br /&gt;
 * Niklas Laxström, Domas Mituzas, Rob Church, Yuri Astrakhan, Aryeh Gregor,&lt;br /&gt;
 * Aaron Schulz, Andrew Garrett, Raimond Spekking, Alexandre Emsenhuber&lt;br /&gt;
 * Siebrand Mazeland, Chad Horohoe, Roan Kattouw and others.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is free software; you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation; either version 2 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 *&lt;br /&gt;
 * You should have received a copy of the GNU General Public License along&lt;br /&gt;
 * with this program; if not, write to the Free Software Foundation, Inc.,&lt;br /&gt;
 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.&lt;br /&gt;
 * http://www.gnu.org/copyleft/gpl.html&lt;br /&gt;
 *&lt;br /&gt;
 * @file&lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
# Bail on old versions of PHP.  Pretty much every other file in the codebase&lt;br /&gt;
# has structures (try/catch, foo()-&amp;gt;bar(), etc etc) which throw parse errors in&lt;br /&gt;
# PHP 4. Setup.php and ObjectCache.php have structures invalid in PHP 5.0 and&lt;br /&gt;
# 5.1, respectively.&lt;br /&gt;
if ( !function_exists( &#039;version_compare&#039; ) || version_compare( phpversion(), &#039;5.&lt;br /&gt;
3.2&#039; ) &amp;lt; 0 ) {&lt;br /&gt;
	// We need to use dirname( __FILE__ ) here cause __DIR__ is PHP5.3+&lt;br /&gt;
	require( dirname( __FILE__ ) . &#039;/includes/PHPVersionError.php&#039; );&lt;br /&gt;
	wfPHPVersionError( &#039;index.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Initialise common code.  This gives us access to GlobalFunctions, the&lt;br /&gt;
# AutoLoader, and the globals $wgRequest, $wgOut, $wgUser, $wgLang and&lt;br /&gt;
# $wgContLang, amongst others; it does *not* load $wgTitle&lt;br /&gt;
if ( isset( $_SERVER[&#039;MW_COMPILED&#039;] ) ) {&lt;br /&gt;
	require ( &#039;phase3/includes/WebStart.php&#039; );&lt;br /&gt;
} else {&lt;br /&gt;
	require ( __DIR__ . &#039;/includes/WebStart.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
$mediaWiki = new MediaWiki();&lt;br /&gt;
$mediaWiki-&amp;gt;run();&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Test&amp;diff=11902</id>
		<title>Test</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Test&amp;diff=11902"/>
		<updated>2025-03-26T01:18:46Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: Text replacement - &amp;quot;source lang=&amp;quot; to &amp;quot;syntaxhighlight lang=&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
/**&lt;br /&gt;
 * This is the main web entry point for MediaWiki.&lt;br /&gt;
 *&lt;br /&gt;
 * If you are reading this in your web browser, your server is probably&lt;br /&gt;
 * not configured correctly to run PHP applications!&lt;br /&gt;
 *&lt;br /&gt;
 * See the README, INSTALL, and UPGRADE files for basic setup instructions&lt;br /&gt;
 * and pointers to the online documentation.&lt;br /&gt;
 *&lt;br /&gt;
 * http://www.mediawiki.org/&lt;br /&gt;
 *&lt;br /&gt;
 * ----------&lt;br /&gt;
 *&lt;br /&gt;
 * Copyright (C) 2001-2011 Magnus Manske, Brion Vibber, Lee Daniel Crocker,&lt;br /&gt;
 * Tim Starling, Erik Möller, Gabriel Wicke, Ævar Arnfjörð Bjarmason,&lt;br /&gt;
 * Niklas Laxström, Domas Mituzas, Rob Church, Yuri Astrakhan, Aryeh Gregor,&lt;br /&gt;
 * Aaron Schulz, Andrew Garrett, Raimond Spekking, Alexandre Emsenhuber&lt;br /&gt;
 * Siebrand Mazeland, Chad Horohoe, Roan Kattouw and others.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is free software; you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation; either version 2 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 *&lt;br /&gt;
 * You should have received a copy of the GNU General Public License along&lt;br /&gt;
 * with this program; if not, write to the Free Software Foundation, Inc.,&lt;br /&gt;
 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.&lt;br /&gt;
 * http://www.gnu.org/copyleft/gpl.html&lt;br /&gt;
 *&lt;br /&gt;
 * @file&lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
# Bail on old versions of PHP.  Pretty much every other file in the codebase&lt;br /&gt;
# has structures (try/catch, foo()-&amp;gt;bar(), etc etc) which throw parse errors in&lt;br /&gt;
# PHP 4. Setup.php and ObjectCache.php have structures invalid in PHP 5.0 and&lt;br /&gt;
# 5.1, respectively.&lt;br /&gt;
if ( !function_exists( &#039;version_compare&#039; ) || version_compare( phpversion(), &#039;5.&lt;br /&gt;
3.2&#039; ) &amp;lt; 0 ) {&lt;br /&gt;
	// We need to use dirname( __FILE__ ) here cause __DIR__ is PHP5.3+&lt;br /&gt;
	require( dirname( __FILE__ ) . &#039;/includes/PHPVersionError.php&#039; );&lt;br /&gt;
	wfPHPVersionError( &#039;index.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Initialise common code.  This gives us access to GlobalFunctions, the&lt;br /&gt;
# AutoLoader, and the globals $wgRequest, $wgOut, $wgUser, $wgLang and&lt;br /&gt;
# $wgContLang, amongst others; it does *not* load $wgTitle&lt;br /&gt;
if ( isset( $_SERVER[&#039;MW_COMPILED&#039;] ) ) {&lt;br /&gt;
	require ( &#039;phase3/includes/WebStart.php&#039; );&lt;br /&gt;
} else {&lt;br /&gt;
	require ( __DIR__ . &#039;/includes/WebStart.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
$mediaWiki = new MediaWiki();&lt;br /&gt;
$mediaWiki-&amp;gt;run();&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;syntaxhighlight lang=php&amp;gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
/**&lt;br /&gt;
 * This is the main web entry point for MediaWiki.&lt;br /&gt;
 *&lt;br /&gt;
 * If you are reading this in your web browser, your server is probably&lt;br /&gt;
 * not configured correctly to run PHP applications!&lt;br /&gt;
 *&lt;br /&gt;
 * See the README, INSTALL, and UPGRADE files for basic setup instructions&lt;br /&gt;
 * and pointers to the online documentation.&lt;br /&gt;
 *&lt;br /&gt;
 * http://www.mediawiki.org/&lt;br /&gt;
 *&lt;br /&gt;
 * ----------&lt;br /&gt;
 *&lt;br /&gt;
 * Copyright (C) 2001-2011 Magnus Manske, Brion Vibber, Lee Daniel Crocker,&lt;br /&gt;
 * Tim Starling, Erik Möller, Gabriel Wicke, Ævar Arnfjörð Bjarmason,&lt;br /&gt;
 * Niklas Laxström, Domas Mituzas, Rob Church, Yuri Astrakhan, Aryeh Gregor,&lt;br /&gt;
 * Aaron Schulz, Andrew Garrett, Raimond Spekking, Alexandre Emsenhuber&lt;br /&gt;
 * Siebrand Mazeland, Chad Horohoe, Roan Kattouw and others.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is free software; you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation; either version 2 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 *&lt;br /&gt;
 * This program is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 *&lt;br /&gt;
 * You should have received a copy of the GNU General Public License along&lt;br /&gt;
 * with this program; if not, write to the Free Software Foundation, Inc.,&lt;br /&gt;
 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.&lt;br /&gt;
 * http://www.gnu.org/copyleft/gpl.html&lt;br /&gt;
 *&lt;br /&gt;
 * @file&lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
# Bail on old versions of PHP.  Pretty much every other file in the codebase&lt;br /&gt;
# has structures (try/catch, foo()-&amp;gt;bar(), etc etc) which throw parse errors in&lt;br /&gt;
# PHP 4. Setup.php and ObjectCache.php have structures invalid in PHP 5.0 and&lt;br /&gt;
# 5.1, respectively.&lt;br /&gt;
if ( !function_exists( &#039;version_compare&#039; ) || version_compare( phpversion(), &#039;5.&lt;br /&gt;
3.2&#039; ) &amp;lt; 0 ) {&lt;br /&gt;
	// We need to use dirname( __FILE__ ) here cause __DIR__ is PHP5.3+&lt;br /&gt;
	require( dirname( __FILE__ ) . &#039;/includes/PHPVersionError.php&#039; );&lt;br /&gt;
	wfPHPVersionError( &#039;index.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Initialise common code.  This gives us access to GlobalFunctions, the&lt;br /&gt;
# AutoLoader, and the globals $wgRequest, $wgOut, $wgUser, $wgLang and&lt;br /&gt;
# $wgContLang, amongst others; it does *not* load $wgTitle&lt;br /&gt;
if ( isset( $_SERVER[&#039;MW_COMPILED&#039;] ) ) {&lt;br /&gt;
	require ( &#039;phase3/includes/WebStart.php&#039; );&lt;br /&gt;
} else {&lt;br /&gt;
	require ( __DIR__ . &#039;/includes/WebStart.php&#039; );&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
$mediaWiki = new MediaWiki();&lt;br /&gt;
$mediaWiki-&amp;gt;run();&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11881</id>
		<title>How to use ssh keys</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11881"/>
		<updated>2025-03-26T01:07:02Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: source -&amp;gt; syntaxhighlight&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Setting up public key authentication over SSH==&lt;br /&gt;
SSH Keys server as a means of identifying yourself to a Secure Shell (SSH) server using public-key cryptography and challenge-response authentication.&lt;br /&gt;
* An SSH key is made up of two seperate keys - &lt;br /&gt;
** A Private Key - which should be only known to you and be kept private.&lt;br /&gt;
** A Public Key - which can be shared freely with any SSH server.&lt;br /&gt;
&lt;br /&gt;
* Advantages of using SSH Keys&lt;br /&gt;
** Your password is never sent over the network&lt;br /&gt;
** You can connect to multiple servers without having to remember to enter your password for each attempt. &lt;br /&gt;
&lt;br /&gt;
* Below we will take you though some of the basic step of creating SSH keys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Linux===&lt;br /&gt;
* ssh-keygen - is the tool you will use to generate an SSH key pair in Linux&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
$ ssh-keygen -t &amp;lt;type&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* The -t option will allow you to specify the type of encryption to use while creating the key pair. Here are your choices...&lt;br /&gt;
** DSA - 1024 bit algorithm&lt;br /&gt;
** RSA - 2048 - 4096 bit algorithm &lt;br /&gt;
** ECDSA - Elliptic Curve Digital Signature Algorithm that provides smaller key sizes and faster operations. &lt;br /&gt;
** ED25519 - ECDSA with Curve25519 (recommended)&lt;br /&gt;
&lt;br /&gt;
* To create an SSH key that uses ED25519 you would type the following ... &lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t ed25519&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You will be prompted for some information &lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter the file in which to save the key (/user/.ssh/id_ed25519):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can just press enter here as it will save to your home space in a directory called .ssh&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* Entering in a passphrase will give you more security - however if your overall goal is to not have to enter a password everytime you ssh to a server then you do not need to enter a passphrase. &lt;br /&gt;
* The entire process will look something like this &lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t ed25519&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Generating public/private ed25519 key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_ed25519):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_ed25519.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_ed25519.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:/etv442E/ncLYkKZ8h2Hd0SZV3Cn+HHgyN6kECqYcPs user@linux&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ED25519 256]--+&lt;br /&gt;
|  . .     .   ooB|&lt;br /&gt;
|   o +   . o +.*o|&lt;br /&gt;
|    + . . . + =.o|&lt;br /&gt;
|     . . .oo.=.o |&lt;br /&gt;
|      E.S+.oooo. |&lt;br /&gt;
|        + ..+..  |&lt;br /&gt;
|         o +o..  |&lt;br /&gt;
|          o..o+oo|&lt;br /&gt;
|           .+==++|&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You now have 2 files stored in ~/.ssh&lt;br /&gt;
** id_ed25519 - is the private key&lt;br /&gt;
** id_ed25519.pub - is your public key&lt;br /&gt;
&lt;br /&gt;
* Next you will want to copy your public keys to the remote server - you can use a protocol called ssh-copy-id&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
ssh-copy-id user@machine&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; if the file authorized_keys does not exist you will have to create it.&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
* Recommended Tool - [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY]&lt;br /&gt;
** PuTTY is a free implementation of Telnet and SSH for Windows &lt;br /&gt;
&lt;br /&gt;
* You will want to download putty.exe and puttygen.exe &lt;br /&gt;
** You can use putty.exe to ssh to your servers and use puttygen.exe to generate an SSH Key to upload to your server so that you don&#039;t need to enter your password everytime.&lt;br /&gt;
&lt;br /&gt;
* Once downloaded click on the puttygen.exe icon &lt;br /&gt;
[[File:Puttykeygen-icon.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Next Click on Generate to create a public/private key pair. Be sure under Parameters you select the type of key to generate.&lt;br /&gt;
[[File:Puttykeygen.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wait for the Generation to finish&lt;br /&gt;
[[File:Puttykeygen-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Select Save Public Key to store this file to your local machine. &lt;br /&gt;
[[File:Puttykeygen-3.png]]&lt;br /&gt;
&lt;br /&gt;
* This will save it to a .txt file - We suggest saving it to your Desktop or Documents folder for easy access.&lt;br /&gt;
* You can now copy the public key from the PuTTYgen Window and paste that into the &#039;&#039;&#039;authorized_keys&#039;&#039;&#039; file on your server.&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* vim /.ssh/authorized_keys&lt;br /&gt;
* paste the contents from the PuTTYgen Window into the authorized_keys file&lt;br /&gt;
&lt;br /&gt;
===Mac===&lt;br /&gt;
* Very similar to Linux - Just make sure you are using macOS&lt;br /&gt;
* Open a Terminal window found in Go &amp;gt; Applications &amp;gt; Utilities &amp;gt; Terminal&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
mymac:~ user$ ssh-keygen -t ed25519 &lt;br /&gt;
Generating public/private ed25519 key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_ed25519):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_ed25519.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_ed25519.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:/etv442E/ncLYkKZ8h2Hd0SZV3Cn+HHgyN6kECqYcPs user@mymac&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ED25519 256]--+&lt;br /&gt;
|  . .     .   ooB|&lt;br /&gt;
|   o +   . o +.*o|&lt;br /&gt;
|    + . . . + =.o|&lt;br /&gt;
|     . . .oo.=.o |&lt;br /&gt;
|      E.S+.oooo. |&lt;br /&gt;
|        + ..+..  |&lt;br /&gt;
|         o +o..  |&lt;br /&gt;
|          o..o+oo|&lt;br /&gt;
|           .+==++|&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can then open the file id_ed25519.pub in any text editor - and copy the contents and paste it into the authorized_keys file on your server.&lt;br /&gt;
** Or you can vi /Users/users/.ssh/id_ed25519.pub &lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIvmu3T1O31IeeSeylgFMxAu7PMrUM15/P79cJUTlZd7 user@mymac&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You will see it will normally start with the type of encryption &#039;&#039;&#039;ssh-ed25519&#039;&#039;&#039; and may end with a description of what it is .. in this instance &#039;&#039;&#039;user@mymac&#039;&#039;&#039;&lt;br /&gt;
** This is what you will need to copy and add to the authorized_keys file on the server. &lt;br /&gt;
&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* cd .ssh &lt;br /&gt;
* vim authorized_keys&lt;br /&gt;
* Paste the contents from your Mac id_ed25519.pub into this file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:FAQ]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11869</id>
		<title>How to use ssh keys</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11869"/>
		<updated>2025-03-26T01:02:58Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: server -&amp;gt; linux, Mac OS X -&amp;gt; macOS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Setting up public key authentication over SSH==&lt;br /&gt;
SSH Keys server as a means of identifying yourself to a Secure Shell (SSH) server using public-key cryptography and challenge-response authentication.&lt;br /&gt;
* An SSH key is made up of two seperate keys - &lt;br /&gt;
** A Private Key - which should be only known to you and be kept private.&lt;br /&gt;
** A Public Key - which can be shared freely with any SSH server.&lt;br /&gt;
&lt;br /&gt;
* Advantages of using SSH Keys&lt;br /&gt;
** Your password is never sent over the network&lt;br /&gt;
** You can connect to multiple servers without having to remember to enter your password for each attempt. &lt;br /&gt;
&lt;br /&gt;
* Below we will take you though some of the basic step of creating SSH keys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Linux===&lt;br /&gt;
* ssh-keygen - is the tool you will use to generate an SSH key pair in Linux&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
$ ssh-keygen -t &amp;lt;type&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* The -t option will allow you to specify the type of encryption to use while creating the key pair. Here are your choices...&lt;br /&gt;
** DSA - 1024 bit algorithm&lt;br /&gt;
** RSA - 2048 - 4096 bit algorithm &lt;br /&gt;
** ECDSA - Elliptic Curve Digital Signature Algorithm that provides smaller key sizes and faster operations. &lt;br /&gt;
** ED25519 - ECDSA with Curve25519 (recommended)&lt;br /&gt;
&lt;br /&gt;
* To create an SSH key that uses ED25519 you would type the following ... &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t ed25519&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You will be prompted for some information &lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter the file in which to save the key (/user/.ssh/id_ed25519):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can just press enter here as it will save to your home space in a directory called .ssh&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* Entering in a passphrase will give you more security - however if your overall goal is to not have to enter a password everytime you ssh to a server then you do not need to enter a passphrase. &lt;br /&gt;
* The entire process will look something like this &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t ed25519&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Generating public/private ed25519 key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_ed25519):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_ed25519.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_ed25519.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:/etv442E/ncLYkKZ8h2Hd0SZV3Cn+HHgyN6kECqYcPs user@linux&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ED25519 256]--+&lt;br /&gt;
|  . .     .   ooB|&lt;br /&gt;
|   o +   . o +.*o|&lt;br /&gt;
|    + . . . + =.o|&lt;br /&gt;
|     . . .oo.=.o |&lt;br /&gt;
|      E.S+.oooo. |&lt;br /&gt;
|        + ..+..  |&lt;br /&gt;
|         o +o..  |&lt;br /&gt;
|          o..o+oo|&lt;br /&gt;
|           .+==++|&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You now have 2 files stored in ~/.ssh&lt;br /&gt;
** id_ed25519 - is the private key&lt;br /&gt;
** id_ed25519.pub - is your public key&lt;br /&gt;
&lt;br /&gt;
* Next you will want to copy your public keys to the remote server - you can use a protocol called ssh-copy-id&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-copy-id user@machine&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; if the file authorized_keys does not exist you will have to create it.&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
* Recommended Tool - [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY]&lt;br /&gt;
** PuTTY is a free implementation of Telnet and SSH for Windows &lt;br /&gt;
&lt;br /&gt;
* You will want to download putty.exe and puttygen.exe &lt;br /&gt;
** You can use putty.exe to ssh to your servers and use puttygen.exe to generate an SSH Key to upload to your server so that you don&#039;t need to enter your password everytime.&lt;br /&gt;
&lt;br /&gt;
* Once downloaded click on the puttygen.exe icon &lt;br /&gt;
[[File:Puttykeygen-icon.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Next Click on Generate to create a public/private key pair. Be sure under Parameters you select the type of key to generate.&lt;br /&gt;
[[File:Puttykeygen.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wait for the Generation to finish&lt;br /&gt;
[[File:Puttykeygen-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Select Save Public Key to store this file to your local machine. &lt;br /&gt;
[[File:Puttykeygen-3.png]]&lt;br /&gt;
&lt;br /&gt;
* This will save it to a .txt file - We suggest saving it to your Desktop or Documents folder for easy access.&lt;br /&gt;
* You can now copy the public key from the PuTTYgen Window and paste that into the &#039;&#039;&#039;authorized_keys&#039;&#039;&#039; file on your server.&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* vim /.ssh/authorized_keys&lt;br /&gt;
* paste the contents from the PuTTYgen Window into the authorized_keys file&lt;br /&gt;
&lt;br /&gt;
===Mac===&lt;br /&gt;
* Very similar to Linux - Just make sure you are using macOS&lt;br /&gt;
* Open a Terminal window found in Go &amp;gt; Applications &amp;gt; Utilities &amp;gt; Terminal&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
mymac:~ user$ ssh-keygen -t ed25519 &lt;br /&gt;
Generating public/private ed25519 key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_ed25519):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_ed25519.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_ed25519.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:/etv442E/ncLYkKZ8h2Hd0SZV3Cn+HHgyN6kECqYcPs user@mymac&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ED25519 256]--+&lt;br /&gt;
|  . .     .   ooB|&lt;br /&gt;
|   o +   . o +.*o|&lt;br /&gt;
|    + . . . + =.o|&lt;br /&gt;
|     . . .oo.=.o |&lt;br /&gt;
|      E.S+.oooo. |&lt;br /&gt;
|        + ..+..  |&lt;br /&gt;
|         o +o..  |&lt;br /&gt;
|          o..o+oo|&lt;br /&gt;
|           .+==++|&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can then open the file id_ed25519.pub in any text editor - and copy the contents and paste it into the authorized_keys file on your server.&lt;br /&gt;
** Or you can vi /Users/users/.ssh/id_ed25519.pub &lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIvmu3T1O31IeeSeylgFMxAu7PMrUM15/P79cJUTlZd7 user@mymac&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You will see it will normally start with the type of encryption &#039;&#039;&#039;ssh-ed25519&#039;&#039;&#039; and may end with a description of what it is .. in this instance &#039;&#039;&#039;user@mymac&#039;&#039;&#039;&lt;br /&gt;
** This is what you will need to copy and add to the authorized_keys file on the server. &lt;br /&gt;
&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* cd .ssh &lt;br /&gt;
* vim authorized_keys&lt;br /&gt;
* Paste the contents from your Mac id_ed25519.pub into this file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:FAQ]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11857</id>
		<title>How to use ssh keys</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11857"/>
		<updated>2025-03-26T01:01:12Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: update from rsa to ed25519&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Setting up public key authentication over SSH==&lt;br /&gt;
SSH Keys server as a means of identifying yourself to a Secure Shell (SSH) server using public-key cryptography and challenge-response authentication.&lt;br /&gt;
* An SSH key is made up of two seperate keys - &lt;br /&gt;
** A Private Key - which should be only known to you and be kept private.&lt;br /&gt;
** A Public Key - which can be shared freely with any SSH server.&lt;br /&gt;
&lt;br /&gt;
* Advantages of using SSH Keys&lt;br /&gt;
** Your password is never sent over the network&lt;br /&gt;
** You can connect to multiple servers without having to remember to enter your password for each attempt. &lt;br /&gt;
&lt;br /&gt;
* Below we will take you though some of the basic step of creating SSH keys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Linux===&lt;br /&gt;
* ssh-keygen - is the tool you will use to generate an SSH key pair in Linux&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
$ ssh-keygen -t &amp;lt;type&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* The -t option will allow you to specify the type of encryption to use while creating the key pair. Here are your choices...&lt;br /&gt;
** DSA - 1024 bit algorithm&lt;br /&gt;
** RSA - 2048 - 4096 bit algorithm &lt;br /&gt;
** ECDSA - Elliptic Curve Digital Signature Algorithm that provides smaller key sizes and faster operations. &lt;br /&gt;
** ED25519 - ECDSA with Curve25519 (recommended)&lt;br /&gt;
&lt;br /&gt;
* To create an SSH key that uses ED25519 you would type the following ... &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t ed25519&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You will be prompted for some information &lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter the file in which to save the key (/user/.ssh/id_ed25519):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can just press enter here as it will save to your home space in a directory called .ssh&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* Entering in a passphrase will give you more security - however if your overall goal is to not have to enter a password everytime you ssh to a server then you do not need to enter a passphrase. &lt;br /&gt;
* The entire process will look something like this &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t ed25519&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Generating public/private ed25519 key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_ed25519):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_ed25519.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_ed25519.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:/etv442E/ncLYkKZ8h2Hd0SZV3Cn+HHgyN6kECqYcPs user@server&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ED25519 256]--+&lt;br /&gt;
|  . .     .   ooB|&lt;br /&gt;
|   o +   . o +.*o|&lt;br /&gt;
|    + . . . + =.o|&lt;br /&gt;
|     . . .oo.=.o |&lt;br /&gt;
|      E.S+.oooo. |&lt;br /&gt;
|        + ..+..  |&lt;br /&gt;
|         o +o..  |&lt;br /&gt;
|          o..o+oo|&lt;br /&gt;
|           .+==++|&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You now have 2 files stored in ~/.ssh&lt;br /&gt;
** id_ed25519 - is the private key&lt;br /&gt;
** id_ed25519.pub - is your public key&lt;br /&gt;
&lt;br /&gt;
* Next you will want to copy your public keys to the remote server - you can use a protocol called ssh-copy-id&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-copy-id user@machine&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; if the file authorized_keys does not exist you will have to create it.&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
* Recommended Tool - [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY]&lt;br /&gt;
** PuTTY is a free implementation of Telnet and SSH for Windows &lt;br /&gt;
&lt;br /&gt;
* You will want to download putty.exe and puttygen.exe &lt;br /&gt;
** You can use putty.exe to ssh to your servers and use puttygen.exe to generate an SSH Key to upload to your server so that you don&#039;t need to enter your password everytime.&lt;br /&gt;
&lt;br /&gt;
* Once downloaded click on the puttygen.exe icon &lt;br /&gt;
[[File:Puttykeygen-icon.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Next Click on Generate to create a public/private key pair. Be sure under Parameters you select the type of key to generate.&lt;br /&gt;
[[File:Puttykeygen.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wait for the Generation to finish&lt;br /&gt;
[[File:Puttykeygen-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Select Save Public Key to store this file to your local machine. &lt;br /&gt;
[[File:Puttykeygen-3.png]]&lt;br /&gt;
&lt;br /&gt;
* This will save it to a .txt file - We suggest saving it to your Desktop or Documents folder for easy access.&lt;br /&gt;
* You can now copy the public key from the PuTTYgen Window and paste that into the &#039;&#039;&#039;authorized_keys&#039;&#039;&#039; file on your server.&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* vim /.ssh/authorized_keys&lt;br /&gt;
* paste the contents from the PuTTYgen Window into the authorized_keys file&lt;br /&gt;
&lt;br /&gt;
===Mac===&lt;br /&gt;
* Very similar to Linux - Just make sure you are using Mac OS X &lt;br /&gt;
* Open a Terminal window found in Go &amp;gt; Applications &amp;gt; Utilities &amp;gt; Terminal&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
mymac:~ user$ ssh-keygen -t ed25519 &lt;br /&gt;
Generating public/private ed25519 key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_ed25519):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_ed25519.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_ed25519.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
SHA256:/etv442E/ncLYkKZ8h2Hd0SZV3Cn+HHgyN6kECqYcPs user@mymac&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ED25519 256]--+&lt;br /&gt;
|  . .     .   ooB|&lt;br /&gt;
|   o +   . o +.*o|&lt;br /&gt;
|    + . . . + =.o|&lt;br /&gt;
|     . . .oo.=.o |&lt;br /&gt;
|      E.S+.oooo. |&lt;br /&gt;
|        + ..+..  |&lt;br /&gt;
|         o +o..  |&lt;br /&gt;
|          o..o+oo|&lt;br /&gt;
|           .+==++|&lt;br /&gt;
+----[SHA256]-----+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can then open the file id_ed25519.pub in any text editor - and copy the contents and paste it into the authorized_keys file on your server.&lt;br /&gt;
** Or you can vi /Users/users/.ssh/id_ed25519.pub &lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIvmu3T1O31IeeSeylgFMxAu7PMrUM15/P79cJUTlZd7 user@mymac&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You will see it will normally start with the type of encryption &#039;&#039;&#039;ssh-ed25519&#039;&#039;&#039; and may end with a description of what it is .. in this instance &#039;&#039;&#039;user@mymac&#039;&#039;&#039;&lt;br /&gt;
** This is what you will need to copy and add to the authorized_keys file on the server. &lt;br /&gt;
&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* cd .ssh &lt;br /&gt;
* vim authorized_keys&lt;br /&gt;
* Paste the contents from your mac id_ed25519.pub into this file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:FAQ]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11830</id>
		<title>How to use ssh keys</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11830"/>
		<updated>2025-03-25T20:19:04Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: Undo revision 11827 by Pashdown (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Setting up public key authentication over SSH==&lt;br /&gt;
SSH Keys server as a means of identifying yourself to a Secure Shell (SSH) server using public-key cryptography and challenge-response authentication.&lt;br /&gt;
* An SSH key is made up of two seperate keys - &lt;br /&gt;
** A Private Key - which should be only known to you and be kept private.&lt;br /&gt;
** A Public Key - which can be shared freely with any SSH server.&lt;br /&gt;
&lt;br /&gt;
* Advantages of using SSH Keys&lt;br /&gt;
** Your password is never sent over the network&lt;br /&gt;
** You can connect to multiple servers without having to remember to enter your password for each attempt. &lt;br /&gt;
&lt;br /&gt;
* Below we will take you though some of the basic step of creating SSH keys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Linux===&lt;br /&gt;
* ssh-keygen - is the tool you will use to generate an SSH key pair in Linux&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
$ ssh-keygen -t &amp;lt;type&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* The -t option will allow you to specify the type of encryption to use while creating the key pair. Here are your choices...&lt;br /&gt;
** DSA - 1024 bit algorithm&lt;br /&gt;
** RSA - 2048 - 4096 bit algorithm (recommended) &lt;br /&gt;
** ECDSA - Elliptic Curve Digital Signature Algorithm that provides smaller key sizes and faster operations. &lt;br /&gt;
&lt;br /&gt;
* To create an SSH key that uses RSA you would type the following ... &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You will be prompted for some information &lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter the file in which to save the key (/user/.ssh/id_rsa):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can just press enter here as it will save to your home space in a directory called .ssh&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* Entering in a passphrase will give you more security - however if your overall goal is to not have to enter a password everytime you ssh to a server then you do not need to enter a passphrase. &lt;br /&gt;
* The entire process will look something like this &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_rsa):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
e7:38:47:65:25:71:ff:1c:ee:e4:a8:37:31:0d:58:80 user@server&lt;br /&gt;
The keys randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|          ..+.o  |&lt;br /&gt;
|         E   = . |&lt;br /&gt;
|            =  ..|&lt;br /&gt;
|           + ...o|&lt;br /&gt;
|        S o   ooo|&lt;br /&gt;
|         =   o=. |&lt;br /&gt;
|        o o  .oo |&lt;br /&gt;
|         o  .o   |&lt;br /&gt;
|           .. .  |&lt;br /&gt;
+-----------------+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You now have 2 files stored in ~/.ssh&lt;br /&gt;
** id_rsa - is the private key&lt;br /&gt;
** id_rsa.pub - is your public key&lt;br /&gt;
&lt;br /&gt;
* Next you will want to copy your public keys to the remote server - you can use a protocol called ssh-copy-id&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-copy-id user@machine&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; if the file authorized_keys does not exist you will have to create it.&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
* Recommended Tool - [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY]&lt;br /&gt;
** PuTTY is a free implementation of Telnet and SSH for Windows &lt;br /&gt;
&lt;br /&gt;
* You will want to download putty.exe and puttygen.exe &lt;br /&gt;
** You can use putty.exe to ssh to your servers and use puttygen.exe to generate an SSH Key to upload to your server so that you don&#039;t need to enter your password everytime.&lt;br /&gt;
&lt;br /&gt;
* Once downloaded click on the puttygen.exe icon &lt;br /&gt;
[[File:Puttykeygen-icon.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Next Click on Generate to create a public/private key pair. Be sure under Parameters you select the type of key to generate.&lt;br /&gt;
[[File:Puttykeygen.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wait for the Generation to finish&lt;br /&gt;
[[File:Puttykeygen-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Select Save Public Key to store this file to your local machine. &lt;br /&gt;
[[File:Puttykeygen-3.png]]&lt;br /&gt;
&lt;br /&gt;
* This will save it to a .txt file - We suggest saving it to your Desktop or Documents folder for easy access.&lt;br /&gt;
* You can now copy the public key from the PuTTYgen Window and paste that into the &#039;&#039;&#039;authorized_keys&#039;&#039;&#039; file on your server.&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* vim /.ssh/authorized_keys&lt;br /&gt;
* paste the contents from the PuTTYgen Window into the authorized_keys file&lt;br /&gt;
&lt;br /&gt;
===Mac===&lt;br /&gt;
* Very similar to Linux - Just make sure you are using Mac OS X &lt;br /&gt;
* Open a Terminal window found in Go &amp;gt; Applications &amp;gt; Utilities &amp;gt; Terminal&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
mymac:~ user$ ssh-keygen -t rsa &lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/Users/user/.ssh/id_rsa):&lt;br /&gt;
Creating directory &#039;/Users/user/.ssh&#039;.&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /Users/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /Users/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key finderprint is:&lt;br /&gt;
e7:38:47:65:25:71:ff:1c:ee:e4:a8:37:31:0d:58:80 user@mymac&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|          ..+.o  |&lt;br /&gt;
|         E   = . |&lt;br /&gt;
|            =  ..|&lt;br /&gt;
|           + ...o|&lt;br /&gt;
|        S o   ooo|&lt;br /&gt;
|         =   o=. |&lt;br /&gt;
|        o o  .oo |&lt;br /&gt;
|         o  .o   |&lt;br /&gt;
|           .. .  |&lt;br /&gt;
+-----------------+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You can then open the file id_rsa.pub in any text editor - and copy the contents and paste it into the authorized_keys file on your server.&lt;br /&gt;
** Or you can vi /Users/users/.ssh/id_rsa.pub &lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDbssnZ8NweOd3i00gZX+iRY8s2bOYh7j+zc00ln/t6OLE66HVxo7OcYKoF0mN1W4hFXktlWaMs3JOBdTMF1tGySm1W8O+pXvporA/rb+2SBnpvD2kAa7AnuNzEBoJ89SGD2NC0rwXick9pOLTSKLy8rVBkEW6jZ4qut0kisIVtq/2jGEMSDmiGd1dPF2AmVJIpLYz2R5gFGMLW6TANXtH5+3VNtCu6ZfI0vFFNW1RfY7O8xWeov4Lu4qxAGI/59gvMUvtUVOycvxQilXjh9s7A1zohv+vYrjga8I2YUKK5JScMrL7ltZ1c31n3rsn5cQqcUhrpahqDS0KUe+rO3LzXiPX4LasIiaO7wnR9e3bm8T9eHCOQplhVqYWB5nW9pQIhu2wdZWVZSwjk9pMK3l0hGIHPVEqMUxnaNXXaYFIFAajnM/hw+/dzmlRNL9IUOGOZ1OvyZiuKhT2XI/5DJl3eReeD1lIjdF0aO0GFJXsq5tk0VjJqkiMEYiB3Th9qSqzP6lUq7Q48J7l6DVpPloNHXq7Fth9ofFU/p0iW0Ax5PIQCfkS7tBgW5gecJ5sR2F3QdXdC+DDbvJUXa3KO1CwepNYGm0nKmztiY7oEQ8nrB1MQsw6uEgj1MGzVkYKeRoEPAH2c1MJq+LjmUhxh0x0pRFeQYiccKl2v/AI0CA40Dw== user@mymac&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You will see it will normally start with the type of encryption &#039;&#039;&#039;ssh-rsa&#039;&#039;&#039; and may end with a description of what it is .. in this instance &#039;&#039;&#039;user@mymac&#039;&#039;&#039;&lt;br /&gt;
** This is what you will need to copy and add to the authorized_keys file on the server. &lt;br /&gt;
&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* cd .ssh &lt;br /&gt;
* vim authorized_keys&lt;br /&gt;
* Paste the contents from your mac id_rsa.pub into this file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:FAQ]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11827</id>
		<title>How to use ssh keys</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=How_to_use_ssh_keys&amp;diff=11827"/>
		<updated>2025-03-25T20:18:50Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: test&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Setting up public key authentication over SSH==&lt;br /&gt;
SSH Keys server as a means of identifying yourself to a Secure Shell (SSH) server using public-key cryptography and challenge-response authentication.&lt;br /&gt;
* An SSH key is made up of two seperate keys - &lt;br /&gt;
** A Private Key - which should be only known to you and be kept private.&lt;br /&gt;
** A Public Key - which can be shared freely with any SSH server.&lt;br /&gt;
&lt;br /&gt;
* Advantages of using SSH Keys&lt;br /&gt;
** Your password is never sent over the network&lt;br /&gt;
** You can connect to multiple servers without having to remember to enter your password for each attempt. &lt;br /&gt;
** test&lt;br /&gt;
* Below we will take you though some of the basic step of creating SSH keys.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Linux===&lt;br /&gt;
* ssh-keygen - is the tool you will use to generate an SSH key pair in Linux&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
$ ssh-keygen -t &amp;lt;type&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* The -t option will allow you to specify the type of encryption to use while creating the key pair. Here are your choices...&lt;br /&gt;
** DSA - 1024 bit algorithm&lt;br /&gt;
** RSA - 2048 - 4096 bit algorithm (recommended) &lt;br /&gt;
** ECDSA - Elliptic Curve Digital Signature Algorithm that provides smaller key sizes and faster operations. &lt;br /&gt;
&lt;br /&gt;
* To create an SSH key that uses RSA you would type the following ... &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You will be prompted for some information &lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter the file in which to save the key (/user/.ssh/id_rsa):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* You can just press enter here as it will save to your home space in a directory called .ssh&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
* Entering in a passphrase will give you more security - however if your overall goal is to not have to enter a password everytime you ssh to a server then you do not need to enter a passphrase. &lt;br /&gt;
* The entire process will look something like this &lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save thr key (/user/.ssh/id_rsa):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /user/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
e7:38:47:65:25:71:ff:1c:ee:e4:a8:37:31:0d:58:80 user@server&lt;br /&gt;
The keys randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|          ..+.o  |&lt;br /&gt;
|         E   = . |&lt;br /&gt;
|            =  ..|&lt;br /&gt;
|           + ...o|&lt;br /&gt;
|        S o   ooo|&lt;br /&gt;
|         =   o=. |&lt;br /&gt;
|        o o  .oo |&lt;br /&gt;
|         o  .o   |&lt;br /&gt;
|           .. .  |&lt;br /&gt;
+-----------------+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You now have 2 files stored in ~/.ssh&lt;br /&gt;
** id_rsa - is the private key&lt;br /&gt;
** id_rsa.pub - is your public key&lt;br /&gt;
&lt;br /&gt;
* Next you will want to copy your public keys to the remote server - you can use a protocol called ssh-copy-id&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
ssh-copy-id user@machine&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; if the file authorized_keys does not exist you will have to create it.&lt;br /&gt;
&lt;br /&gt;
===Windows===&lt;br /&gt;
* Recommended Tool - [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY]&lt;br /&gt;
** PuTTY is a free implementation of Telnet and SSH for Windows &lt;br /&gt;
&lt;br /&gt;
* You will want to download putty.exe and puttygen.exe &lt;br /&gt;
** You can use putty.exe to ssh to your servers and use puttygen.exe to generate an SSH Key to upload to your server so that you don&#039;t need to enter your password everytime.&lt;br /&gt;
&lt;br /&gt;
* Once downloaded click on the puttygen.exe icon &lt;br /&gt;
[[File:Puttykeygen-icon.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Next Click on Generate to create a public/private key pair. Be sure under Parameters you select the type of key to generate.&lt;br /&gt;
[[File:Puttykeygen.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wait for the Generation to finish&lt;br /&gt;
[[File:Puttykeygen-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Select Save Public Key to store this file to your local machine. &lt;br /&gt;
[[File:Puttykeygen-3.png]]&lt;br /&gt;
&lt;br /&gt;
* This will save it to a .txt file - We suggest saving it to your Desktop or Documents folder for easy access.&lt;br /&gt;
* You can now copy the public key from the PuTTYgen Window and paste that into the &#039;&#039;&#039;authorized_keys&#039;&#039;&#039; file on your server.&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* vim /.ssh/authorized_keys&lt;br /&gt;
* paste the contents from the PuTTYgen Window into the authorized_keys file&lt;br /&gt;
&lt;br /&gt;
===Mac===&lt;br /&gt;
* Very similar to Linux - Just make sure you are using Mac OS X &lt;br /&gt;
* Open a Terminal window found in Go &amp;gt; Applications &amp;gt; Utilities &amp;gt; Terminal&lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
mymac:~ user$ ssh-keygen -t rsa &lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/Users/user/.ssh/id_rsa):&lt;br /&gt;
Creating directory &#039;/Users/user/.ssh&#039;.&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /Users/user/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /Users/user/.ssh/id_rsa.pub.&lt;br /&gt;
The key finderprint is:&lt;br /&gt;
e7:38:47:65:25:71:ff:1c:ee:e4:a8:37:31:0d:58:80 user@mymac&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|          ..+.o  |&lt;br /&gt;
|         E   = . |&lt;br /&gt;
|            =  ..|&lt;br /&gt;
|           + ...o|&lt;br /&gt;
|        S o   ooo|&lt;br /&gt;
|         =   o=. |&lt;br /&gt;
|        o o  .oo |&lt;br /&gt;
|         o  .o   |&lt;br /&gt;
|           .. .  |&lt;br /&gt;
+-----------------+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* You can then open the file id_rsa.pub in any text editor - and copy the contents and paste it into the authorized_keys file on your server.&lt;br /&gt;
** Or you can vi /Users/users/.ssh/id_rsa.pub &lt;br /&gt;
&amp;lt;code&amp;gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
ssh-rsa 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 user@mymac&lt;br /&gt;
&amp;lt;/pre&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
* You will see it will normally start with the type of encryption &#039;&#039;&#039;ssh-rsa&#039;&#039;&#039; and may end with a description of what it is .. in this instance &#039;&#039;&#039;user@mymac&#039;&#039;&#039;&lt;br /&gt;
** This is what you will need to copy and add to the authorized_keys file on the server. &lt;br /&gt;
&lt;br /&gt;
* SSH to your server&lt;br /&gt;
* cd .ssh &lt;br /&gt;
* vim authorized_keys&lt;br /&gt;
* Paste the contents from your mac id_rsa.pub into this file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE if the file &#039;&#039;authorized_keys&#039;&#039; did not exist and you had to create it you must make sure it has the right file permissions in this case 600 (eg -rw------- ).&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:FAQ]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11814</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11814"/>
		<updated>2025-03-13T20:42:55Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: https caching no bueno&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering ads, and providing protection against tracking. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy ([[https://wiki.squid-cache.org Squid]]),  transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.  Please note that no cache service is capable of caching HTTPS encrypted pages.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via &#039;&#039;&#039;socks.xmission.com&#039;&#039;&#039; at port &#039;&#039;&#039;1080&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at &#039;&#039;&#039;stun.xmission.com&#039;&#039;&#039; with the secondary interface at &#039;&#039;&#039;stun2.xmission.com&#039;&#039;&#039;, UDP ports &#039;&#039;&#039;3478&#039;&#039;&#039; and &#039;&#039;&#039;3479&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11813</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11813"/>
		<updated>2025-03-13T20:41:43Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: bold&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering ads, and providing protection against tracking. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy ([[https://wiki.squid-cache.org Squid]])  transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via &#039;&#039;&#039;socks.xmission.com&#039;&#039;&#039; at port &#039;&#039;&#039;1080&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at &#039;&#039;&#039;stun.xmission.com&#039;&#039;&#039; with the secondary interface at &#039;&#039;&#039;stun2.xmission.com&#039;&#039;&#039;, UDP ports &#039;&#039;&#039;3478&#039;&#039;&#039; and &#039;&#039;&#039;3479&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11812</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11812"/>
		<updated>2025-03-13T20:40:57Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: bold&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering ads, and providing protection against tracking. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy ([[https://wiki.squid-cache.org Squid]])  transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via &#039;&#039;&#039;socks.xmission.com&#039;&#039;&#039; at port &#039;&#039;&#039;1080&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at stun.xmission.com with the secondary interface at stun2.xmission.com, UDP ports 3478 and 3479.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Caching_Proxy&amp;diff=11811</id>
		<title>Caching Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Caching_Proxy&amp;diff=11811"/>
		<updated>2025-03-13T20:40:23Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: add port information&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==General Port Information==&lt;br /&gt;
&lt;br /&gt;
Squid Proxy Cache  is available on port &#039;&#039;&#039;8080&#039;&#039;&#039; and &#039;&#039;&#039;3128&#039;&#039;&#039;  on the server &#039;&#039;&#039;proxy.xmission.com&#039;&#039;&#039;.  Also available are ports &#039;&#039;&#039;3130&#039;&#039;&#039; for &#039;&#039;&#039;ICP&#039;&#039;&#039; and &#039;&#039;&#039;4827&#039;&#039;&#039; for &#039;&#039;&#039;HTCP&#039;&#039;&#039; cache chaining.&lt;br /&gt;
==Windows / Internet Explorer==&lt;br /&gt;
#Click on &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Tools&amp;lt;/span&amp;gt; and select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Internet Options...&amp;lt;/span&amp;gt;. &lt;br /&gt;
#Click on the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Connections&amp;lt;/span&amp;gt; tab. &lt;br /&gt;
#If you Dial-Up to XMission select XMission in the &amp;quot;Dial-up&amp;quot; window pane and click &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Settings...&amp;lt;/span&amp;gt;&lt;br /&gt;
#If you connect with DSL click the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;LAN Settings...&amp;lt;/span&amp;gt; button. &lt;br /&gt;
#Check &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Use automatic configuration script&amp;lt;/span&amp;gt;. &lt;br /&gt;
#In the text field to the right of &#039;&#039;&#039;Address&#039;&#039;&#039; enter &#039;&#039;&#039;http://proxy.xmission.com/proxy.pac&#039;&#039;&#039;&lt;br /&gt;
#Press &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;OK&amp;lt;/span&amp;gt; at the bottom.&lt;br /&gt;
==Firefox==&lt;br /&gt;
#Find your &#039;&#039;&#039;Preferences&#039;&#039;&#039; settings.  This varies by platform.&lt;br /&gt;
#:Linux - &#039;&#039;&#039;Edit&#039;&#039;&#039; Menu, then &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Preferences&amp;lt;/span&amp;gt;.&lt;br /&gt;
#:OSX - &#039;&#039;&#039;Firefox&#039;&#039;&#039; Menu, then &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Preferences&amp;lt;/span&amp;gt;.&lt;br /&gt;
#:Windows - &#039;&#039;&#039;Tools&#039;&#039;&#039; Menu, then &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Options&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Select the  &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Advanced&amp;lt;/span&amp;gt; section.&lt;br /&gt;
#Press the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Settings...&amp;lt;/span&amp;gt; button after &#039;&#039;&#039;Configure how Firefox connects to the Internet&#039;&#039;&#039;.&lt;br /&gt;
#Select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Automatic proxy configuration URL:&amp;lt;/span&amp;gt; and enter &#039;&#039;&#039;http://proxy.xmission.com/proxy.pac&#039;&#039;&#039; in the text field.&lt;br /&gt;
#Press &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;OK&amp;lt;/span&amp;gt; at the bottom.&lt;br /&gt;
&lt;br /&gt;
==Apple OSX / Safari==&lt;br /&gt;
#Click on the Apple icon and select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;System Preferences&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Click on &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Network&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Click on &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Advanced...&amp;lt;/span&amp;gt; in the lower right corner of the Network window.&lt;br /&gt;
#Select the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Proxies&amp;lt;/span&amp;gt; tab.&lt;br /&gt;
#Click the button next to &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Automatic Proxy Configuration&amp;lt;/span&amp;gt;.&lt;br /&gt;
#In the text field to the right of &#039;&#039;&#039;URL&#039;&#039;&#039; enter &#039;&#039;&#039;http://proxy.xmission.com/proxy.pac&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Google Chrome==&lt;br /&gt;
#Pull down the menu under the icon shaped like a wrench.&lt;br /&gt;
#Select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Options&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Select the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Under the Hood&amp;lt;/span&amp;gt; tab.&lt;br /&gt;
#Under the &#039;&#039;&#039;Network&#039;&#039;&#039; section, press the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Change proxy settings&amp;lt;/span&amp;gt; button.&lt;br /&gt;
#Click the check button next to &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Automatic Proxy Configuration&amp;lt;/span&amp;gt;.&lt;br /&gt;
#In the text field to the right of &#039;&#039;&#039;Autoconfiguration URL:&#039;&#039;&#039; enter &#039;&#039;&#039;http://proxy.xmission.com/proxy.pac&#039;&#039;&#039;.&lt;br /&gt;
#Press &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Close&amp;lt;/span&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies|Caching Proxy]]&lt;br /&gt;
[[Category:Getting Started]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Privoxy_Usage&amp;diff=11810</id>
		<title>Privoxy Usage</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Privoxy_Usage&amp;diff=11810"/>
		<updated>2025-03-13T20:28:12Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: add port information&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Introduction&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. &lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering pop-up advertisements and regular web advertisements. Privoxy is based off Junkbuster but provides better filtering. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
==General Port Information==&lt;br /&gt;
&lt;br /&gt;
Privoxy is available on port &#039;&#039;&#039;8081&#039;&#039;&#039; on the server &#039;&#039;&#039;proxy.xmission.com&#039;&#039;&#039;.&lt;br /&gt;
==Windows / Internet Explorer==&lt;br /&gt;
#Click on &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Tools&amp;lt;/span&amp;gt; and select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Internet Options...&amp;lt;/span&amp;gt;. &lt;br /&gt;
#Click on the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Connections&amp;lt;/span&amp;gt; tab. &lt;br /&gt;
#If you Dial-Up to XMission select XMission in the &amp;quot;Dial-up&amp;quot; window pane and click &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Settings...&amp;lt;/span&amp;gt;&lt;br /&gt;
#If you connect with DSL click the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;LAN Settings...&amp;lt;/span&amp;gt; button. &lt;br /&gt;
#Check &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Use automatic configuration script&amp;lt;/span&amp;gt;. &lt;br /&gt;
#In the text field to the right of &#039;&#039;&#039;Address&#039;&#039;&#039; enter &#039;&#039;&#039;http://proxy.xmission.com/privoxy.pac&#039;&#039;&#039;&lt;br /&gt;
#Press &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;OK&amp;lt;/span&amp;gt; at the bottom.&lt;br /&gt;
==Firefox==&lt;br /&gt;
#Find your &#039;&#039;&#039;Preferences&#039;&#039;&#039; settings.  This varies by platform.&lt;br /&gt;
#:Linux - &#039;&#039;&#039;Edit&#039;&#039;&#039; Menu, then &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Preferences&amp;lt;/span&amp;gt;.&lt;br /&gt;
#:OSX - &#039;&#039;&#039;Firefox&#039;&#039;&#039; Menu, then &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Preferences&amp;lt;/span&amp;gt;.&lt;br /&gt;
#:Windows - &#039;&#039;&#039;Tools&#039;&#039;&#039; Menu, then &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Options&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Select the  &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Advanced&amp;lt;/span&amp;gt; section.&lt;br /&gt;
#Press the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Settings...&amp;lt;/span&amp;gt; button after &#039;&#039;&#039;Configure how Firefox connects to the Internet&#039;&#039;&#039;.&lt;br /&gt;
#Select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Automatic proxy configuration URL:&amp;lt;/span&amp;gt; and enter &#039;&#039;&#039;http://proxy.xmission.com/privoxy.pac&#039;&#039;&#039; in the text field.&lt;br /&gt;
#Press &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;OK&amp;lt;/span&amp;gt; at the bottom.&lt;br /&gt;
&lt;br /&gt;
==Apple OSX / Safari==&lt;br /&gt;
#Click on the Apple icon and select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;System Preferences&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Click on &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Network&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Click on &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Advanced...&amp;lt;/span&amp;gt; in the lower right corner of the Network window.&lt;br /&gt;
#Select the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Proxies&amp;lt;/span&amp;gt; tab.&lt;br /&gt;
#Click the button next to &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Automatic Proxy Configuration&amp;lt;/span&amp;gt;.&lt;br /&gt;
#In the text field to the right of &#039;&#039;&#039;URL&#039;&#039;&#039; enter &#039;&#039;&#039;http://proxy.xmission.com/privoxy.pac&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Google Chrome==&lt;br /&gt;
#Pull down the menu under the icon shaped like a wrench.&lt;br /&gt;
#Select &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Options&amp;lt;/span&amp;gt;.&lt;br /&gt;
#Select the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Under the Hood&amp;lt;/span&amp;gt; tab.&lt;br /&gt;
#Under the &#039;&#039;&#039;Network&#039;&#039;&#039; section, press the &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Change proxy settings&amp;lt;/span&amp;gt; button.&lt;br /&gt;
#Click the check button next to &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Automatic Proxy Configuration&amp;lt;/span&amp;gt;.&lt;br /&gt;
#In the text field to the right of &#039;&#039;&#039;Autoconfiguration URL:&#039;&#039;&#039; enter &#039;&#039;&#039;http://proxy.xmission.com/privoxy.pac&#039;&#039;&#039;&#039;.&lt;br /&gt;
#Press &amp;lt;span class=&amp;quot;button&amp;quot;&amp;gt;Close&amp;lt;/span&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Proxies|Privoxy]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11809</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11809"/>
		<updated>2025-03-13T20:25:56Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: update Privoxy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering ads, and providing protection against tracking. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy ([[https://wiki.squid-cache.org Squid]])  transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via socks.xmission.com at port 1080.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at stun.xmission.com with the secondary interface at stun2.xmission.com, UDP ports 3478 and 3479.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11808</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11808"/>
		<updated>2025-03-13T18:34:53Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: link squid to website&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering pop-up advertisements and regular web advertisements. XMission had previously offered a proxy called &amp;quot;Junkbuster&amp;quot; for the same purpose. Privoxy is based off Junkbuster but provides better filtering. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy ([[https://wiki.squid-cache.org Squid]])  transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via socks.xmission.com at port 1080.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at stun.xmission.com with the secondary interface at stun2.xmission.com, UDP ports 3478 and 3479.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11807</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11807"/>
		<updated>2025-03-13T18:34:07Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: add squid&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering pop-up advertisements and regular web advertisements. XMission had previously offered a proxy called &amp;quot;Junkbuster&amp;quot; for the same purpose. Privoxy is based off Junkbuster but provides better filtering. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy (Squid)  transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via socks.xmission.com at port 1080.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at stun.xmission.com with the secondary interface at stun2.xmission.com, UDP ports 3478 and 3479.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11806</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=11806"/>
		<updated>2025-03-13T18:33:03Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: remove dansguardian and dialup accellerator update socks versions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proxy Servers&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
==Privoxy==&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering pop-up advertisements and regular web advertisements. XMission had previously offered a proxy called &amp;quot;Junkbuster&amp;quot; for the same purpose. Privoxy is based off Junkbuster but provides better filtering. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==Normal Caching Proxy==&lt;br /&gt;
&lt;br /&gt;
Our normal proxy transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
==SOCKS v4 v5==&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 v5 proxy services are available for customers inside the XMission network via socks.xmission.com at port 1080.&lt;br /&gt;
&lt;br /&gt;
==Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server==&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at stun.xmission.com with the secondary interface at stun2.xmission.com, UDP ports 3478 and 3479.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11766</id>
		<title>Anti-phishing Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11766"/>
		<updated>2024-12-06T19:36:34Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: spacing&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Phishing is a type of online fraud that attempts to trick people into giving up their personal information, such as passwords, credit card numbers, and Social Security numbers. Phishing attacks often come in the form of emails that appear to be from legitimate sources, such as banks or government agencies. Note that XMission and other legitimate entities will never ask for such information via email. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;To protect our customers from phishing attacks, we recommend the following general measures&#039;&#039;&#039;: ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Hover over any website address before you click.&#039;&#039;&#039; This will allow you to see the actual address of the website, even if it is disguised by a fake address.&lt;br /&gt;
* &#039;&#039;&#039;Copy and Paste.&#039;&#039;&#039; Sometimes the hover does not present anything. You can also right click and copy the address.  Paste it into a notepad or text editor to examine whether it is legitimate or not.&lt;br /&gt;
* &#039;&#039;&#039;Be cautious with unknown senders.&#039;&#039;&#039; If you receive an email from someone you don&#039;t know, be cautious about clicking on any links or opening any attachments. We recommend you not reply to unknown senders.&lt;br /&gt;
* &#039;&#039;&#039;Do not install unauthorized software and do not share credentials with anyone.&#039;&#039;&#039; Only install software from trusted sources, and never share your login credentials with anyone.&lt;br /&gt;
* &#039;&#039;&#039;Use long, complex passwords and a password manager.&#039;&#039;&#039; Your passwords should be at least 12 characters long and include a mix of upper and lower case letters, numbers, and symbols. Use a password manager (e.g. Bitwarden, LastPass, etc.) to help you create and remember strong passwords, and to make your password unique for each login.&lt;br /&gt;
* &#039;&#039;&#039;Use social media responsibly.&#039;&#039;&#039; Be careful about what you share on social media, as this information can be used by phishers to target you.&lt;br /&gt;
* &#039;&#039;&#039;Deploy multi-factor authentication.&#039;&#039;&#039; Multi-factor authentication adds an extra layer of security to your accounts by requiring you to provide a second form of identification, such as a code sent to your phone, when you log in.&lt;br /&gt;
&lt;br /&gt;
By following these recommendations, you can help protect yourself from phishing attacks and keep your personal information safe.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;But what about specific emails that reach your XMission inbox?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Here are some common phishing tricks and examples we see in email sent to our customers:&lt;br /&gt;
* &#039;&#039;&#039;Different sender:&#039;&#039;&#039; The “From” email address is different from the official domain (e.g., dom@randomdomainxyz123.com instead of help@officialdomain.com).&lt;br /&gt;
* &#039;&#039;&#039;Fake XMission email:&#039;&#039;&#039; The email body looks almost like something we might send but the “From:” and/or “To:”  is missing or incorrect, and any links point to a non-XMission website (i.e., clickbait). XMission emails will only link to xmission.com websites and those associated with our billing partner, rev.io.&lt;br /&gt;
* &#039;&#039;&#039;Vague or urgent requests:&#039;&#039;&#039; Be wary of vague content or emails that create unnecessary urgency.&lt;br /&gt;
* &#039;&#039;&#039;Check for warning flags:&#039;&#039;&#039; Pay attention to alerts from your email client about potential phishing or external senders.&lt;br /&gt;
* &#039;&#039;&#039;Report as spam:&#039;&#039;&#039; Anytime you get email you’ve identified as spam or a phishing attempt, please report it to us so we can improve our spam filters and protect others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;What if you’re still uncertain if something is a phish?&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
In most cases, you can probably ignore it. If it pretends to be from your bank or another vendor you actually have a relationship with, verify by calling them or logging in to your account with the entity but don’t use a link shared via email just to be safe. &lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Want to know more?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Phishing scams commonly employ a variety of deceptive tactics to trick victims. Here are some prevalent examples:&lt;br /&gt;
* &#039;&#039;&#039;Deceptive emails and websites:&#039;&#039;&#039; Phishers often send emails that appear to be from reputable organizations, such as banks, online retailers, or social media platforms. These emails typically contain a sense of urgency, prompting victims to click on a link or download an attachment. However, these links often lead to fake websites that closely resemble the legitimate ones, designed to steal login credentials or other sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Spear phishing:&#039;&#039;&#039; This targeted form of phishing involves emails that are personalized to the recipient, often using their name, job title, or other personal details. This approach makes the email appear more legitimate and increases the likelihood that the victim will fall for the scam.&lt;br /&gt;
* &#039;&#039;&#039;Smishing and vishing:&#039;&#039;&#039; Phishing attacks are not limited to email. Smishing uses text messages to deceive victims, while vishing relies on phone calls. In both cases, the attacker attempts to manipulate the victim into revealing personal information or performing a specific action.&lt;br /&gt;
* &#039;&#039;&#039;Social engineering:&#039;&#039;&#039; Phishers often use social engineering techniques to manipulate victims into taking the desired action. This may involve creating a sense of fear, urgency, or curiosity. For example, an email might warn of a compromised account or offer a too-good-to-be-true deal.&lt;br /&gt;
&lt;br /&gt;
By being aware of these common phishing tricks, individuals can better protect themselves from falling victim to these scams.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Need further guidance?&#039;&#039;&#039; Contact our [https://xmission.com/contact technical support] department.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11765</id>
		<title>Anti-phishing Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11765"/>
		<updated>2024-12-06T19:31:26Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: period&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Phishing is a type of online fraud that attempts to trick people into giving up their personal information, such as passwords, credit card numbers, and Social Security numbers. Phishing attacks often come in the form of emails that appear to be from legitimate sources, such as banks or government agencies. Note that XMission and other legitimate entities will never ask for such information via email. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;To protect our customers from phishing attacks, we recommend the following general measures&#039;&#039;&#039;: ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Hover over any website address before you click.&#039;&#039;&#039; This will allow you to see the actual address of the website, even if it is disguised by a fake address.&lt;br /&gt;
* &#039;&#039;&#039;Copy and Paste.&#039;&#039;&#039; Sometimes the hover does not present anything. You can also right click and copy the address.  Paste it into a notepad or text editor to examine whether it is legitimate or not.&lt;br /&gt;
* &#039;&#039;&#039;Be cautious with unknown senders.&#039;&#039;&#039; If you receive an email from someone you don&#039;t know, be cautious about clicking on any links or opening any attachments. We recommend you not reply to unknown senders.&lt;br /&gt;
* &#039;&#039;&#039;Do not install unauthorized software and do not share credentials with anyone.&#039;&#039;&#039; Only install software from trusted sources, and never share your login credentials with anyone.&lt;br /&gt;
* &#039;&#039;&#039;Use long, complex passwords and a password manager.&#039;&#039;&#039; Your passwords should be at least 12 characters long and include a mix of upper and lower case letters, numbers, and symbols. Use a password manager (e.g. Bitwarden, LastPass, etc.) to help you create and remember strong passwords, and to make your password unique for each login.&lt;br /&gt;
* &#039;&#039;&#039;Use social media responsibly.&#039;&#039;&#039; Be careful about what you share on social media, as this information can be used by phishers to target you.&lt;br /&gt;
* &#039;&#039;&#039;Deploy multi-factor authentication.&#039;&#039;&#039; Multi-factor authentication adds an extra layer of security to your accounts by requiring you to provide a second form of identification, such as a code sent to your phone, when you log in.&lt;br /&gt;
&lt;br /&gt;
By following these recommendations, you can help protect yourself from phishing attacks and keep your personal information safe.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;But what about specific emails that reach your XMission inbox?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Here are some common phishing tricks and examples we see in email sent to our customers:&lt;br /&gt;
* &#039;&#039;&#039;Different sender:&#039;&#039;&#039; The “From” email address is different from the official domain (e.g., dom@randomdomainxyz123.com instead of help@officialdomain.com).&lt;br /&gt;
* &#039;&#039;&#039;Fake XMission email:&#039;&#039;&#039; The email body looks almost like something we might send but the “From:” and/or “To:”  is missing or incorrect, and any links point to a non-XMission website (i.e., clickbait). XMission emails will only link to xmission.com websites and those associated with our billing partner, rev.io.&lt;br /&gt;
* &#039;&#039;&#039;Vague or urgent requests:&#039;&#039;&#039; Be wary of vague content or emails that create unnecessary urgency.&lt;br /&gt;
* &#039;&#039;&#039;Check for warning flags:&#039;&#039;&#039; Pay attention to alerts from your email client about potential phishing or external senders.&lt;br /&gt;
* &#039;&#039;&#039;Report as spam:&#039;&#039;&#039; Anytime you get email you’ve identified as spam or a phishing attempt, please report it to us so we can improve our spam filters and protect others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;What if you’re still uncertain if something is a phish?&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
In most cases, you can probably ignore it. If it pretends to be from your bank or another vendor you actually have a relationship with, verify by calling them or logging in to your account with the entity but don’t use a link shared via email just to be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Want to know more?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Phishing scams commonly employ a variety of deceptive tactics to trick victims. Here are some prevalent examples:&lt;br /&gt;
* &#039;&#039;&#039;Deceptive emails and websites:&#039;&#039;&#039; Phishers often send emails that appear to be from reputable organizations, such as banks, online retailers, or social media platforms. These emails typically contain a sense of urgency, prompting victims to click on a link or download an attachment. However, these links often lead to fake websites that closely resemble the legitimate ones, designed to steal login credentials or other sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Spear phishing:&#039;&#039;&#039; This targeted form of phishing involves emails that are personalized to the recipient, often using their name, job title, or other personal details. This approach makes the email appear more legitimate and increases the likelihood that the victim will fall for the scam.&lt;br /&gt;
* &#039;&#039;&#039;Smishing and vishing:&#039;&#039;&#039; Phishing attacks are not limited to email. Smishing uses text messages to deceive victims, while vishing relies on phone calls. In both cases, the attacker attempts to manipulate the victim into revealing personal information or performing a specific action.&lt;br /&gt;
* &#039;&#039;&#039;Social engineering:&#039;&#039;&#039; Phishers often use social engineering techniques to manipulate victims into taking the desired action. This may involve creating a sense of fear, urgency, or curiosity. For example, an email might warn of a compromised account or offer a too-good-to-be-true deal.&lt;br /&gt;
&lt;br /&gt;
By being aware of these common phishing tricks, individuals can better protect themselves from falling victim to these scams.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Need further guidance?&#039;&#039;&#039; Contact our [https://xmission.com/contact technical support] department.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11764</id>
		<title>Anti-phishing Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11764"/>
		<updated>2024-12-06T19:30:52Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: URL -&amp;gt; address&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Phishing is a type of online fraud that attempts to trick people into giving up their personal information, such as passwords, credit card numbers, and Social Security numbers. Phishing attacks often come in the form of emails that appear to be from legitimate sources, such as banks or government agencies. Note that XMission and other legitimate entities will never ask for such information via email. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;To protect our customers from phishing attacks, we recommend the following general measures&#039;&#039;&#039;: ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Hover over any website address before you click.&#039;&#039;&#039; This will allow you to see the actual address of the website, even if it is disguised by a fake address.&lt;br /&gt;
* &#039;&#039;&#039;Copy and Paste&#039;&#039;&#039; Sometimes the hover does not present anything. You can also right click and copy the address.  Paste it into a notepad or text editor to examine whether it is legitimate or not.&lt;br /&gt;
* &#039;&#039;&#039;Be cautious with unknown senders.&#039;&#039;&#039; If you receive an email from someone you don&#039;t know, be cautious about clicking on any links or opening any attachments. We recommend you not reply to unknown senders.&lt;br /&gt;
* &#039;&#039;&#039;Do not install unauthorized software and do not share credentials with anyone.&#039;&#039;&#039; Only install software from trusted sources, and never share your login credentials with anyone.&lt;br /&gt;
* &#039;&#039;&#039;Use long, complex passwords and a password manager.&#039;&#039;&#039; Your passwords should be at least 12 characters long and include a mix of upper and lower case letters, numbers, and symbols. Use a password manager (e.g. Bitwarden, LastPass, etc.) to help you create and remember strong passwords, and to make your password unique for each login.&lt;br /&gt;
* &#039;&#039;&#039;Use social media responsibly.&#039;&#039;&#039; Be careful about what you share on social media, as this information can be used by phishers to target you.&lt;br /&gt;
* &#039;&#039;&#039;Deploy multi-factor authentication.&#039;&#039;&#039; Multi-factor authentication adds an extra layer of security to your accounts by requiring you to provide a second form of identification, such as a code sent to your phone, when you log in.&lt;br /&gt;
&lt;br /&gt;
By following these recommendations, you can help protect yourself from phishing attacks and keep your personal information safe.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;But what about specific emails that reach your XMission inbox?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Here are some common phishing tricks and examples we see in email sent to our customers:&lt;br /&gt;
* &#039;&#039;&#039;Different sender:&#039;&#039;&#039; The “From” email address is different from the official domain (e.g., dom@randomdomainxyz123.com instead of help@officialdomain.com).&lt;br /&gt;
* &#039;&#039;&#039;Fake XMission email:&#039;&#039;&#039; The email body looks almost like something we might send but the “From:” and/or “To:”  is missing or incorrect, and any links point to a non-XMission website (i.e., clickbait). XMission emails will only link to xmission.com websites and those associated with our billing partner, rev.io.&lt;br /&gt;
* &#039;&#039;&#039;Vague or urgent requests:&#039;&#039;&#039; Be wary of vague content or emails that create unnecessary urgency.&lt;br /&gt;
* &#039;&#039;&#039;Check for warning flags:&#039;&#039;&#039; Pay attention to alerts from your email client about potential phishing or external senders.&lt;br /&gt;
* &#039;&#039;&#039;Report as spam:&#039;&#039;&#039; Anytime you get email you’ve identified as spam or a phishing attempt, please report it to us so we can improve our spam filters and protect others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;What if you’re still uncertain if something is a phish?&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
In most cases, you can probably ignore it. If it pretends to be from your bank or another vendor you actually have a relationship with, verify by calling them or logging in to your account with the entity but don’t use a link shared via email just to be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Want to know more?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Phishing scams commonly employ a variety of deceptive tactics to trick victims. Here are some prevalent examples:&lt;br /&gt;
* &#039;&#039;&#039;Deceptive emails and websites:&#039;&#039;&#039; Phishers often send emails that appear to be from reputable organizations, such as banks, online retailers, or social media platforms. These emails typically contain a sense of urgency, prompting victims to click on a link or download an attachment. However, these links often lead to fake websites that closely resemble the legitimate ones, designed to steal login credentials or other sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Spear phishing:&#039;&#039;&#039; This targeted form of phishing involves emails that are personalized to the recipient, often using their name, job title, or other personal details. This approach makes the email appear more legitimate and increases the likelihood that the victim will fall for the scam.&lt;br /&gt;
* &#039;&#039;&#039;Smishing and vishing:&#039;&#039;&#039; Phishing attacks are not limited to email. Smishing uses text messages to deceive victims, while vishing relies on phone calls. In both cases, the attacker attempts to manipulate the victim into revealing personal information or performing a specific action.&lt;br /&gt;
* &#039;&#039;&#039;Social engineering:&#039;&#039;&#039; Phishers often use social engineering techniques to manipulate victims into taking the desired action. This may involve creating a sense of fear, urgency, or curiosity. For example, an email might warn of a compromised account or offer a too-good-to-be-true deal.&lt;br /&gt;
&lt;br /&gt;
By being aware of these common phishing tricks, individuals can better protect themselves from falling victim to these scams.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Need further guidance?&#039;&#039;&#039; Contact our [https://xmission.com/contact technical support] department.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11763</id>
		<title>Anti-phishing Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11763"/>
		<updated>2024-12-06T19:29:39Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: /* To protect our customers from phishing attacks, we recommend the following general measures: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Phishing is a type of online fraud that attempts to trick people into giving up their personal information, such as passwords, credit card numbers, and Social Security numbers. Phishing attacks often come in the form of emails that appear to be from legitimate sources, such as banks or government agencies. Note that XMission and other legitimate entities will never ask for such information via email. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;To protect our customers from phishing attacks, we recommend the following general measures&#039;&#039;&#039;: ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Hover over any URLs before you click.&#039;&#039;&#039; This will allow you to see the actual URL of the website, even if it is disguised by a fake URL.&lt;br /&gt;
* &#039;&#039;&#039;Copy and Paste&#039;&#039;&#039; Sometimes the hover does not present anything. You can also right click and copy the address.  Paste it into a notepad or text editor to examine whether it is legitimate or not.&lt;br /&gt;
* &#039;&#039;&#039;Be cautious with unknown senders.&#039;&#039;&#039; If you receive an email from someone you don&#039;t know, be cautious about clicking on any links or opening any attachments. We recommend you not reply to unknown senders.&lt;br /&gt;
* &#039;&#039;&#039;Do not install unauthorized software and do not share credentials with anyone.&#039;&#039;&#039; Only install software from trusted sources, and never share your login credentials with anyone.&lt;br /&gt;
* &#039;&#039;&#039;Use long, complex passwords and a password manager.&#039;&#039;&#039; Your passwords should be at least 12 characters long and include a mix of upper and lower case letters, numbers, and symbols. Use a password manager (e.g. Bitwarden, LastPass, etc.) to help you create and remember strong passwords, and to make your password unique for each login.&lt;br /&gt;
* &#039;&#039;&#039;Use social media responsibly.&#039;&#039;&#039; Be careful about what you share on social media, as this information can be used by phishers to target you.&lt;br /&gt;
* &#039;&#039;&#039;Deploy multi-factor authentication.&#039;&#039;&#039; Multi-factor authentication adds an extra layer of security to your accounts by requiring you to provide a second form of identification, such as a code sent to your phone, when you log in.&lt;br /&gt;
&lt;br /&gt;
By following these recommendations, you can help protect yourself from phishing attacks and keep your personal information safe.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;But what about specific emails that reach your XMission inbox?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Here are some common phishing tricks and examples we see in email sent to our customers:&lt;br /&gt;
* &#039;&#039;&#039;Different sender:&#039;&#039;&#039; The “From” email address is different from the official domain (e.g., dom@randomdomainxyz123.com instead of help@officialdomain.com).&lt;br /&gt;
* &#039;&#039;&#039;Fake XMission email:&#039;&#039;&#039; The email body looks almost like something we might send but the “From:” and/or “To:”  is missing or incorrect, and any links point to a non-XMission website (i.e., clickbait). XMission emails will only link to xmission.com websites and those associated with our billing partner, rev.io.&lt;br /&gt;
* &#039;&#039;&#039;Vague or urgent requests:&#039;&#039;&#039; Be wary of vague content or emails that create unnecessary urgency.&lt;br /&gt;
* &#039;&#039;&#039;Check for warning flags:&#039;&#039;&#039; Pay attention to alerts from your email client about potential phishing or external senders.&lt;br /&gt;
* &#039;&#039;&#039;Report as spam:&#039;&#039;&#039; Anytime you get email you’ve identified as spam or a phishing attempt, please report it to us so we can improve our spam filters and protect others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;What if you’re still uncertain if something is a phish?&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
In most cases, you can probably ignore it. If it pretends to be from your bank or another vendor you actually have a relationship with, verify by calling them or logging in to your account with the entity but don’t use a link shared via email just to be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Want to know more?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Phishing scams commonly employ a variety of deceptive tactics to trick victims. Here are some prevalent examples:&lt;br /&gt;
* &#039;&#039;&#039;Deceptive emails and websites:&#039;&#039;&#039; Phishers often send emails that appear to be from reputable organizations, such as banks, online retailers, or social media platforms. These emails typically contain a sense of urgency, prompting victims to click on a link or download an attachment. However, these links often lead to fake websites that closely resemble the legitimate ones, designed to steal login credentials or other sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Spear phishing:&#039;&#039;&#039; This targeted form of phishing involves emails that are personalized to the recipient, often using their name, job title, or other personal details. This approach makes the email appear more legitimate and increases the likelihood that the victim will fall for the scam.&lt;br /&gt;
* &#039;&#039;&#039;Smishing and vishing:&#039;&#039;&#039; Phishing attacks are not limited to email. Smishing uses text messages to deceive victims, while vishing relies on phone calls. In both cases, the attacker attempts to manipulate the victim into revealing personal information or performing a specific action.&lt;br /&gt;
* &#039;&#039;&#039;Social engineering:&#039;&#039;&#039; Phishers often use social engineering techniques to manipulate victims into taking the desired action. This may involve creating a sense of fear, urgency, or curiosity. For example, an email might warn of a compromised account or offer a too-good-to-be-true deal.&lt;br /&gt;
&lt;br /&gt;
By being aware of these common phishing tricks, individuals can better protect themselves from falling victim to these scams.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Need further guidance?&#039;&#039;&#039; Contact our [https://xmission.com/contact technical support] department.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11762</id>
		<title>Anti-phishing Guidance</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Anti-phishing_Guidance&amp;diff=11762"/>
		<updated>2024-12-06T19:29:13Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: increase section headers and add copy &amp;amp; paste&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Phishing is a type of online fraud that attempts to trick people into giving up their personal information, such as passwords, credit card numbers, and Social Security numbers. Phishing attacks often come in the form of emails that appear to be from legitimate sources, such as banks or government agencies. Note that XMission and other legitimate entities will never ask for such information via email. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== To protect our customers from phishing attacks, &#039;&#039;&#039;we recommend the following general measures&#039;&#039;&#039;: ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Hover over any URLs before you click.&#039;&#039;&#039; This will allow you to see the actual URL of the website, even if it is disguised by a fake URL.&lt;br /&gt;
* &#039;&#039;&#039;Copy and Paste&#039;&#039;&#039; Sometimes the hover does not present anything. You can also right click and copy the address.  Paste it into a notepad or text editor to examine whether it is legitimate or not.&lt;br /&gt;
* &#039;&#039;&#039;Be cautious with unknown senders.&#039;&#039;&#039; If you receive an email from someone you don&#039;t know, be cautious about clicking on any links or opening any attachments. We recommend you not reply to unknown senders.&lt;br /&gt;
* &#039;&#039;&#039;Do not install unauthorized software and do not share credentials with anyone.&#039;&#039;&#039; Only install software from trusted sources, and never share your login credentials with anyone.&lt;br /&gt;
* &#039;&#039;&#039;Use long, complex passwords and a password manager.&#039;&#039;&#039; Your passwords should be at least 12 characters long and include a mix of upper and lower case letters, numbers, and symbols. Use a password manager (e.g. Bitwarden, LastPass, etc.) to help you create and remember strong passwords, and to make your password unique for each login.&lt;br /&gt;
* &#039;&#039;&#039;Use social media responsibly.&#039;&#039;&#039; Be careful about what you share on social media, as this information can be used by phishers to target you.&lt;br /&gt;
* &#039;&#039;&#039;Deploy multi-factor authentication.&#039;&#039;&#039; Multi-factor authentication adds an extra layer of security to your accounts by requiring you to provide a second form of identification, such as a code sent to your phone, when you log in.&lt;br /&gt;
&lt;br /&gt;
By following these recommendations, you can help protect yourself from phishing attacks and keep your personal information safe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;But what about specific emails that reach your XMission inbox?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Here are some common phishing tricks and examples we see in email sent to our customers:&lt;br /&gt;
* &#039;&#039;&#039;Different sender:&#039;&#039;&#039; The “From” email address is different from the official domain (e.g., dom@randomdomainxyz123.com instead of help@officialdomain.com).&lt;br /&gt;
* &#039;&#039;&#039;Fake XMission email:&#039;&#039;&#039; The email body looks almost like something we might send but the “From:” and/or “To:”  is missing or incorrect, and any links point to a non-XMission website (i.e., clickbait). XMission emails will only link to xmission.com websites and those associated with our billing partner, rev.io.&lt;br /&gt;
* &#039;&#039;&#039;Vague or urgent requests:&#039;&#039;&#039; Be wary of vague content or emails that create unnecessary urgency.&lt;br /&gt;
* &#039;&#039;&#039;Check for warning flags:&#039;&#039;&#039; Pay attention to alerts from your email client about potential phishing or external senders.&lt;br /&gt;
* &#039;&#039;&#039;Report as spam:&#039;&#039;&#039; Anytime you get email you’ve identified as spam or a phishing attempt, please report it to us so we can improve our spam filters and protect others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;What if you’re still uncertain if something is a phish?&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
In most cases, you can probably ignore it. If it pretends to be from your bank or another vendor you actually have a relationship with, verify by calling them or logging in to your account with the entity but don’t use a link shared via email just to be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Want to know more?&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
Phishing scams commonly employ a variety of deceptive tactics to trick victims. Here are some prevalent examples:&lt;br /&gt;
* &#039;&#039;&#039;Deceptive emails and websites:&#039;&#039;&#039; Phishers often send emails that appear to be from reputable organizations, such as banks, online retailers, or social media platforms. These emails typically contain a sense of urgency, prompting victims to click on a link or download an attachment. However, these links often lead to fake websites that closely resemble the legitimate ones, designed to steal login credentials or other sensitive information.&lt;br /&gt;
* &#039;&#039;&#039;Spear phishing:&#039;&#039;&#039; This targeted form of phishing involves emails that are personalized to the recipient, often using their name, job title, or other personal details. This approach makes the email appear more legitimate and increases the likelihood that the victim will fall for the scam.&lt;br /&gt;
* &#039;&#039;&#039;Smishing and vishing:&#039;&#039;&#039; Phishing attacks are not limited to email. Smishing uses text messages to deceive victims, while vishing relies on phone calls. In both cases, the attacker attempts to manipulate the victim into revealing personal information or performing a specific action.&lt;br /&gt;
* &#039;&#039;&#039;Social engineering:&#039;&#039;&#039; Phishers often use social engineering techniques to manipulate victims into taking the desired action. This may involve creating a sense of fear, urgency, or curiosity. For example, an email might warn of a compromised account or offer a too-good-to-be-true deal.&lt;br /&gt;
&lt;br /&gt;
By being aware of these common phishing tricks, individuals can better protect themselves from falling victim to these scams.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Need further guidance?&#039;&#039;&#039; Contact our [https://xmission.com/contact technical support] department.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Peering_Policy&amp;diff=11456</id>
		<title>Peering Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Peering_Policy&amp;diff=11456"/>
		<updated>2023-01-24T18:50:03Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: /* Peering Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Operational Requirements ==&lt;br /&gt;
#Both parties provide an escalation path for resolving network issues in a timely fashion. Issues of a non-emergency technical nature should be responded to within 48 hours.&lt;br /&gt;
#Both parties shall be responsive to unsolicited bulk email, hacking, Denial of Service, and other network security and abuse issues. A good faith effort should be made to provide a qualified network engineer to trace ongoing network attacks within a reasonable amount of time.&lt;br /&gt;
#Both parties shall provide access to a route server, looking glass, or similar service for the purposes of routing audits, diagnostics, and troubleshooting.&lt;br /&gt;
#Both parties shall work quickly and diligently to establish additional capacity to accommodate traffic growth.&lt;br /&gt;
&lt;br /&gt;
== Technical Requirements ==&lt;br /&gt;
#Both parties shall announce consistent routes across all interconnection points.&lt;br /&gt;
#Both parties are expected to register their routes in a public Internet Routing Registry (IRR) database, for the purposes of filtering. Both parties shall make good faith efforts to keep this information up to date.&lt;br /&gt;
#Both parties shall make every reasonable effort to restrict the transmission of Denial of Service attacks and packets with forged source addresses from their network.&lt;br /&gt;
#Both parties shall announce only their own routes and the routes of their transit customers to the other party. No other routes are permitted, and may be filtered if detected.&lt;br /&gt;
#Neither party shall establish a static route, a route of last resort, or otherwise send traffic to the other party for a route not announced via BGP. Neither party shall alter, sell, or give next-hops to a third party. These activities are considered theft of service, and will be prosecuted to the fullest extent of the law.&lt;br /&gt;
#Neither party shall announce to the other the more specific routes of prefixes learned via a third party transit customer.&lt;br /&gt;
#BGP MD5 authentication is preferred, but not required.&lt;br /&gt;
#Peers are expected to aggregate their routes.  Anything smaller than a IPv4 /24 will be dropped.&lt;br /&gt;
&lt;br /&gt;
== General Policy ==&lt;br /&gt;
#XMission reserves the right to change this policy at any time.&lt;br /&gt;
#In the event of a severe or quality-of-service impacting violation of these policies, the interconnection may be temporarily suspended without notice.&lt;br /&gt;
#Any interconnection may be terminated for any reason, with 30 days notice.&lt;br /&gt;
#All requirements must be met at the time the request for Peering is made, and must continue to be met for the duration of the interconnection.&lt;br /&gt;
#XMission reserves the right to accept or decline any interconnection request for any reason.&lt;br /&gt;
&lt;br /&gt;
== Peering Information ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;ASN:&#039;&#039;&#039;  6315&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://www.radb.net/query/ IRR AS-SET]:&#039;&#039;&#039;  AS-XMISSION&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://www.peeringdb.com/view.php?asn=6315 PeeringDB]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Suggested IPv4 Max Prefix:&#039;&#039;&#039; 75&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Suggested IPv6 Max Prefix:&#039;&#039;&#039; 5&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Contact:&#039;&#039;&#039; [mailto:peering@xmission.com peering@xmission.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FAQ]][[Category:About]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Mailing_Lists&amp;diff=11312</id>
		<title>Mailing Lists</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Mailing_Lists&amp;diff=11312"/>
		<updated>2022-11-08T16:34:05Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: update for mailman3&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;XMission offers mailing lists via the [https://docs.mailman3.org/en/latest/ GNU Mailman] software. You can view the publicly available mailing lists on our system by visiting the [https://mailman.xmission.com/postorius/lists/ Mailman listinfo page]. List administrators can access the web interface for their lists by [https://mailman.xmission.com/accounts/login/?next=/postorius/lists/ logging in].  The account you setup to administer a mailing list is different from your XMission account.&lt;br /&gt;
&lt;br /&gt;
Mailman is designed primarily for discussion between subscribers, so users who intend to use the Mailman system for one-way [[announcement lists]] will need to make changes to the configuration of their Mailman list before attempting to use it for this purpose.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039; &#039;&#039; XMission requires that only list subscribers can post to mailman lists. All lists must be restricted in this form.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
[[Category:Hosting|Mailing Lists]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10929</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10929"/>
		<updated>2021-09-19T08:51:06Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: buy/purchase&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can purchase additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  You can recover this file by going to /home/.zfs/(name of snapshot)/(original file location), and copying it out to your own home directory.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone. Files in snapshots are read-only.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10928</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10928"/>
		<updated>2021-09-19T08:16:15Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: customer copying from snapshots fixed.  instructions put back in.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can buy additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  You can recover this file by going to /home/.zfs/(name of snapshot)/(original file location), and copying it out to your own home directory.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone. Files in snapshots are read-only.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10927</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10927"/>
		<updated>2021-09-19T08:14:09Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: Undo revision 10926 by Pashdown (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can buy additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  Currently, snapshots of files are only accessible to XMission staff.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone. Files in snapshots are read-only.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10926</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10926"/>
		<updated>2021-09-19T07:59:05Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: /* What are home snapshots? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can buy additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  Currently, snapshots of files are only accessible to XMission staff. Please send a request to support@xmission.com if you need a file or directory recovered.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone. Files in snapshots are read-only.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10925</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10925"/>
		<updated>2021-09-19T07:58:34Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: users can&amp;#039;t access snapshots&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can buy additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  Currently, snapshots of files are only accessible to XMission staff.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone. Files in snapshots are read-only.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10924</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10924"/>
		<updated>2021-09-19T04:41:21Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: grammar and add read-only&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can buy additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  You can recover this file by going to /home/.zfs/(name of snapshot)/(original file location), and copying it out to your own home directory.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone. Files in snapshots are read-only.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Home&amp;diff=10922</id>
		<title>Home</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Home&amp;diff=10922"/>
		<updated>2021-09-16T18:21:11Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: initial&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is home storage?==&lt;br /&gt;
Home storage is storage located in the XMission facility that is available to customers for shell, ftp, and web services via user.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How much storage is there per customer?==&lt;br /&gt;
The base quota is 50 gigabytes.  You can buy additional gigabytes if needed.&lt;br /&gt;
&lt;br /&gt;
==How can I see how much quota &amp;amp; usage I have?==&lt;br /&gt;
On shell:&lt;br /&gt;
&amp;lt;syntaxhighlight lang=bash&amp;gt;&lt;br /&gt;
/usr/local/bin/homequota&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==How do I access this storage?==&lt;br /&gt;
You can use shell services, ssh/sftp, or ftp services to transfer files in and out of your home storage.&lt;br /&gt;
&lt;br /&gt;
==What are home snapshots?==&lt;br /&gt;
Snapshots are a service that saves a state of the home storage every hour.  Hourly snapshots are kept 24 hours.  In addition, a daily and weekly snapshots are made.  Snapshots are useful if you accidentally delete or overwrite an important file.  You can recover this file by going to /home/.zfs/(name of snapshot)/(original file location), and copying it out to your own home directory.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that until the snapshot of your deleted file expires, it will still count against your quota.  There is no way to delete this without removing the snapshot for everyone.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=MediaWiki:Deletereason-dropdown&amp;diff=10921</id>
		<title>MediaWiki:Deletereason-dropdown</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=MediaWiki:Deletereason-dropdown&amp;diff=10921"/>
		<updated>2021-09-16T18:04:12Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: add depreciated service&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Common delete reasons&lt;br /&gt;
** Spam&lt;br /&gt;
** Vandalism&lt;br /&gt;
** Copyright violation&lt;br /&gt;
** Author request&lt;br /&gt;
** Broken redirect&lt;br /&gt;
** Depreciated service&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Shell_Access&amp;diff=10920</id>
		<title>Shell Access</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Shell_Access&amp;diff=10920"/>
		<updated>2021-09-16T18:03:07Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: remove telnet&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==How do I activate my shell account?==&lt;br /&gt;
To activate your shell account, simply contact accounting or technical support. &lt;br /&gt;
&lt;br /&gt;
==Why isn&#039;t shell access on by default?==&lt;br /&gt;
Having shell access enabled by default on all accounts presents a  security risk. A shell account gives the user a direct window into  our system. By minimizing the number of active shell accounts, we  minimize the risk of compromising our system.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Can I choose my shell type?==&lt;br /&gt;
Yes. You can choose from bash, tcsh, sh, zsh, csh, and ksh. We recommend using either bash or csh, at first, since they&#039;re the most user-friendly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is SSH and how do I use it?==&lt;br /&gt;
SSH is a secure shell. Using it is differs, depending on the operating  system.  Mac OS X is probably the easiest. Nothing special has to be installed.  Simply open a terminal window and &amp;lt;tt&amp;gt;ssh username@shell.xmission.com&amp;lt;/tt&amp;gt;.  Accept the key and enter your password.  For most Windows operating systems, an SSH client must be used. There  are many SSH clients on the market and a few are &amp;quot;freeware&amp;quot;. PuTTY is a recommended free SSH client for Windows. Some places to look for additional SSH software would be Download.com and Tucows.com.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why don&#039;t my screen and text work properly?==&lt;br /&gt;
There are two typical problems that occur during a telnet session.  The first and most common problem is incorrect terminal emulation.  The second problem occurs after a screen has been messed up by viewing  a binary file.&lt;br /&gt;
 &lt;br /&gt;
The most commonly used terminal emulation is vt100, though vt220  is supported and recommended. To change the terminal emulation of  your telnet application, view the preferences and choose either vt100  or vt220. However, even after specifying the terminal emulation for  your telnet application, you may still have problems correctly displaying  columns and rows. For this, you&#039;ll need to define the default size  of your window in your run commands (explained below]).  When trying to fix a screen after viewing a binary file, run &amp;lt;tt&amp;gt;fixvt&amp;lt;/tt&amp;gt; at a command prompt.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are some common commands I&#039;ll need to know when using the UNIX shell?==&lt;br /&gt;
The most common commands you&#039;ll need to know are &amp;lt;tt&amp;gt;cd&amp;lt;/tt&amp;gt; (changes your directory), &amp;lt;tt&amp;gt;pwd&amp;lt;/tt&amp;gt; (shows your current directory path), and &amp;lt;tt&amp;gt;ls&amp;lt;/tt&amp;gt; (lists the contents of the current directory). For a more complete list of common commands, please see our Common Commands page. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why do I get &amp;quot;command not found&amp;quot; when using a command I&#039;m sure should work? ==&lt;br /&gt;
It&#039;s possible that you don&#039;t have the paths to the command directories defined correctly in your run commands. For instructions on defining the correct paths, see below. &lt;br /&gt;
&lt;br /&gt;
==How do I edit my shell run commands (rc) file?==&lt;br /&gt;
Your shell run commands are found in a file named &#039;&#039;.cshrc&#039;&#039; (for c shell),  &#039;&#039;.bashrc&#039;&#039; (for borne shell), &#039;&#039;.kshrc&#039;&#039; (for korn shell), etc. This file  will be located in your home directory (/home/users/u/username). It  contains commands that are run when you first log on to set your  paths, environment variables, and aliases. Before changing ANY rc file, it&#039;s recommended you make a back-up copy.&lt;br /&gt;
&lt;br /&gt;
To set or edit your paths, edit your run commands file with a text  editor (pico, vi, ed, etc.). Your paths will be defined after the  command &amp;lt;tt&amp;gt;set path =&amp;lt;/tt&amp;gt;. The default paths should be &amp;lt;tt&amp;gt;/bin /usr/local/bin  /usr/bin&amp;lt;/tt&amp;gt;. If you&#039;d like to add a path, simply add it to the end,  separated by a space. (e.g.: /home/users/u/username/morecommands/)  If you&#039;d like to edit what information is displayed in your prompt,  edit the &amp;lt;tt&amp;gt;set prompt=&amp;lt;/tt&amp;gt; variable. A useful way to define your prompt  is to have it display your current directory. To do this, remove the  default &amp;lt;tt&amp;gt;set prompt=&amp;lt;/tt&amp;gt; and enter this in its place:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;alias cd &#039;cd \!* ; set prompt=&amp;quot;&#039;hostname&#039;:&#039;pwd&#039;&amp;gt; &amp;quot;&#039;&amp;lt;/tt&amp;gt;  To edit your environment variables, first type &amp;lt;tt&amp;gt;env&amp;lt;/tt&amp;gt; at a command  prompt to show your current variables. If you&#039;d like to change any  of these, enter the definition after a new &amp;quot;setenv&amp;quot; line. The proper  syntax, as you&#039;ll see in the default settings, is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;setenv VARIABLE_NAME path/or/command:/2nd/path/or/command/&amp;lt;/tt&amp;gt;  Adding an alias is fairly simple. If you&#039;d like a certain command  to be run when you type something in at the command prompt, you&#039;d  enter that here. The proper syntax is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;alias aliasedcommand &#039;realcommand -options&#039;&amp;lt;/tt&amp;gt;  This is also where you define your terminal emulation settings.&lt;br /&gt;
&amp;lt;tt&amp;gt;setenv TERM vt100   &amp;lt;/tt&amp;gt;(sets terminal type)&lt;br /&gt;
&amp;lt;tt&amp;gt;/bin/stty rows 24   &amp;lt;/tt&amp;gt;(sets number of rows)&lt;br /&gt;
&amp;lt;tt&amp;gt;/bin/stty cols 80   &amp;lt;/tt&amp;gt;(sets number of columns)&lt;br /&gt;
&amp;lt;tt&amp;gt;/bin/stty erase ^H   &amp;lt;/tt&amp;gt;(sets backspace command)  &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are all these files in my home directory, and what are they for?==&lt;br /&gt;
If you do a complete list, showing hidden files, of your home directory,  you will notice that there are several files already there. The files  are listed and explained in the table below. Some of these files will  not be there by default, but only appear if the application that uses  them is run. &lt;br /&gt;
&lt;br /&gt;
===Types===&lt;br /&gt;
rc run commands/preferences (usually, but not always)&lt;br /&gt;
&lt;br /&gt;
===Files===&lt;br /&gt;
.cshrc shell run commands(for csh or tcsh) .gopherrc gopher preferences .login shell preferences (read after run commands at login) .newsrc news preferences .nn Network News Reader preferences .pinerc Pine preferences (pine is primarily used for email) .tin Threaded Internetwork News preferences&lt;br /&gt;
&lt;br /&gt;
===Directories===&lt;br /&gt;
bin can contain scripts or binary executables ftp your personal directory for file transfer mail Email is stored here (used by pine and others) news articles are saved here by default public_html your web pages&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I alter the information shown in my prompt?==&lt;br /&gt;
If you use tcsh, changing the prompt is as simple as entering the command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;set prompt=&amp;quot;options&amp;quot;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, with other shells, you will need to edit the &amp;lt;tt&amp;gt;set prompt=&amp;lt;/tt&amp;gt; line in your shell run commands file (shown above). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What program can I use to read email from a shell? ==&lt;br /&gt;
&lt;br /&gt;
Probably the most popular options are &#039;&#039;mutt&#039;&#039; (recommended) and &#039;&#039;pine&#039;&#039;, but &#039;&#039;elm&#039;&#039;, &#039;&#039;mail/rmail&#039;&#039;, and &#039;&#039;emacs&#039;&#039; are also available. At a command prompt, run the command &amp;lt;tt&amp;gt;mutt&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;pine&amp;lt;/tt&amp;gt;, or &amp;lt;tt&amp;gt;elm&amp;lt;/tt&amp;gt; and the mail client will open, also creating either a /mail (pine and elm) or /Mail (mutt) directory. Using mail/rmail &lt;br /&gt;
or emacs isn&#039;t quite as intuitive. It&#039;s recommended that you read the manual before using. (Type &amp;lt;tt&amp;gt;man mail&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;man emacs&amp;lt;/tt&amp;gt; at a command prompt.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What program can I use to read news (Usenet) from a shell?==&lt;br /&gt;
The newsreaders available on shell are slrn, tin, nn, pine, nmh, trn, and emacs. The most popular ones would be slrn, tin, nn, and pine. We recommend slrn, since it&#039;s the only one that still has development. For more information on how to use any of these programs, type &amp;quot;man&amp;quot; followed by the program name at the command prompt (e.g.: &amp;lt;tt&amp;gt;man tin&amp;lt;/tt&amp;gt;). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How do I kill a process? ==&lt;br /&gt;
Before you kill a processes, you have to have its processes ID. You get this by typing &amp;quot;ps&amp;quot; at the command prompt. Once you&#039;ve determined which one of your processes is the one you want to kill, type &amp;lt;tt&amp;gt;kill -9 PID&amp;lt;/tt&amp;gt; (where PID is the actual processes ID) at the command prompt. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Is there a way to transfer files to and from my XMission account other than FTP?==&lt;br /&gt;
Although FTP is the recommended way to transfer files to and from your XMission account, it&#039;s not the only way. SFTP (ssh ftp) works directly to shell.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How do I compress and decompress files? ==&lt;br /&gt;
The method you&#039;ll use to decompress a file is determined by looking at the file extension. The instructions below show how to decompress the file in the current directory. For further information, see the &lt;br /&gt;
manual for each program (tar, bzip, unzip, gzip, uncompress).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.tar    &amp;lt;/tt&amp;gt;&amp;lt;tt&amp;gt;tar xvf file.tar&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.Z   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;uncompress file.Z&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.gz   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;gzip -d file.gz&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.zip   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;unzip file.zip&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.bz2   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;bzip2 -d file.bz2&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there is a combination of formats, such as file.tar.gz, you can &lt;br /&gt;
either pipe one command to the other (e.g. &amp;lt;tt&amp;gt;gzip -d file.tar.gz | tar &lt;br /&gt;
xvf&amp;lt;/tt&amp;gt;), or see if the option is supported by tar (&amp;lt;tt&amp;gt;man tar&amp;lt;/tt&amp;gt;&amp;gt;. Using the command &lt;br /&gt;
&amp;lt;tt&amp;gt;tar xvfz file.tar.gz&amp;lt;/tt&amp;gt; will handle both the gzip compression and the &lt;br /&gt;
tar compression. When piping a .Z file, however, be sure to use &amp;lt;tt&amp;gt;zcat &lt;br /&gt;
file.Z&amp;lt;/tt&amp;gt; (the equivalent of &amp;lt;tt&amp;gt;uncompress -c file.Z&amp;lt;/tt&amp;gt;, which writes to standard &lt;br /&gt;
output the files that were compressed). A similar rule applies to &lt;br /&gt;
bzip2, where you should use &amp;lt;tt&amp;gt;bzcat file.bz2&amp;lt;/tt&amp;gt; (equal to &amp;lt;tt&amp;gt;bzip2 -dc file.bz2&amp;lt;/tt&amp;gt;) &lt;br /&gt;
when piping the output to another command. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are some basics on setting permissions with &amp;quot;chmod&amp;quot;?==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
First, an understanding of file/directory ownership is needed. Each &lt;br /&gt;
file or directory has a user (also the owner) and a group. The owner &lt;br /&gt;
of your files should always be your XMission username. The groups &lt;br /&gt;
you&#039;ll need to know are www (which gives the web server access to &lt;br /&gt;
the files) and users (which gives any of XMission&#039;s users, from shell, &lt;br /&gt;
access to the files). There&#039;s also the category, others, that includes &lt;br /&gt;
any user or group.&lt;br /&gt;
&lt;br /&gt;
Permissions are based on those three categories: owner, group, and &lt;br /&gt;
others. When you do a long listing of the file (&amp;lt;tt&amp;gt;ls -l filename&amp;lt;/tt&amp;gt;), the &lt;br /&gt;
permissions will be displayed to the left. The format is shown as &lt;br /&gt;
such: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;-rw-r--r-- 1 acctname group 1949 Sep &lt;br /&gt;
19 2000 file.html&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The first space defines weather the file is a simple file (shown with a hyphen) or a directory (shown with a d). The next three spaces represent the permissions (highlighted in red) &lt;br /&gt;
for the owner, the next three are for the group, and the last three &lt;br /&gt;
are for others. The letters represent what kind of permissions are &lt;br /&gt;
allowed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;r &#039;&#039;&#039; = Read (view and make copies)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;w &#039;&#039;&#039; = Write (make changes to or delete)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;x &#039;&#039;&#039; = Execute (run program/script) &lt;br /&gt;
When using &amp;quot;chmod&amp;quot; to change permissions, you will need to specify &lt;br /&gt;
the category by using one or a combination of the following letters:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;u &#039;&#039;&#039; = User (Owner)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;g &#039;&#039;&#039; = Group&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;o &#039;&#039;&#039; = Others&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;a &#039;&#039;&#039; = All (same as using &amp;quot;ugo&amp;quot;) &lt;br /&gt;
To change the permissions, execute &amp;quot;chmod&amp;quot; with the following parameters:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod who+/-/=permission file&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The plus (+) adds the following permission, the minus (-) removes &lt;br /&gt;
it, and the (=) adds it, discarding any previous permissions. Some &lt;br /&gt;
examples:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod g+r file.html&amp;lt;/tt&amp;gt; (adds read access for group)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod go-r file.html&amp;lt;/tt&amp;gt; (removes read access from group and &lt;br /&gt;
others)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod a=x file.html&amp;lt;/tt&amp;gt; (replaces existing permissions with read &lt;br /&gt;
access for all)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod g+rx file.html&amp;lt;/tt&amp;gt; (adds read and execute access for group) &lt;br /&gt;
There is another way to change permissions without having to write &lt;br /&gt;
out &amp;lt;tt&amp;gt;chmod who+/-/=permission file&amp;lt;/tt&amp;gt; every time. This method uses a 3-digit octal &lt;br /&gt;
number. Determining the octal number is fairly easy after some practice. &lt;br /&gt;
To start, refer to the chart below. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Symbol &#039;&#039;&#039; &#039;&#039;&#039;Octal &#039;&#039;&#039;---0--x1-w-2-wx3r--4r-x5rw-6rwx7&amp;lt;/td&amp;gt;&lt;br /&gt;
For example, if you&#039;d like to set the permissions on file.html &lt;br /&gt;
to be &amp;lt;tt&amp;gt;-rw-r--r--&amp;lt;/tt&amp;gt; you would determine the octal number &lt;br /&gt;
like this (skip the first space in the set): &lt;br /&gt;
&amp;lt;tt&amp;gt;rw-&amp;lt;/tt&amp;gt; = 6, &amp;lt;tt&amp;gt;r--&amp;lt;/tt&amp;gt; = 4, &amp;lt;tt&amp;gt;r--&amp;lt;/tt&amp;gt; = 4. The octal &lt;br /&gt;
number is 644. &lt;br /&gt;
 To execute the command, type:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod 644 file.html&amp;lt;/tt&amp;gt; &lt;br /&gt;
&amp;lt;div class=&amp;quot;messagebox metadata&amp;quot;&amp;gt;&#039;&#039;&#039;Note&#039;&#039;&#039;: This would be the same as using:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod a+r file.html&lt;br /&gt;
&lt;br /&gt;
chmod u+x file.html&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(if no permissions were previously set). &amp;lt;/div&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Changing ownership and the group of a file would normally be done &lt;br /&gt;
with &amp;quot;chown&amp;quot; and &amp;quot;chgrp&amp;quot;. However, because these commands are restricted &lt;br /&gt;
to the user and group being specified, you&#039;re unable to use them on &lt;br /&gt;
XMission (because you&#039;re only one user and you&#039;re only a member of &lt;br /&gt;
one group). However, if you&#039;d like a file to belong to the group www, &lt;br /&gt;
you can either create it in or upload it to your public_html directory. &lt;br /&gt;
This will set the group, by default, to www. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FAQ|Shell Access]]&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:Getting Started]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Shell_Access&amp;diff=10919</id>
		<title>Shell Access</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Shell_Access&amp;diff=10919"/>
		<updated>2021-09-16T18:02:02Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: get rid of zmodem&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==How do I activate my shell account?==&lt;br /&gt;
To activate your shell account, simply contact accounting or technical support. &lt;br /&gt;
&lt;br /&gt;
==Why isn&#039;t shell access on by default?==&lt;br /&gt;
Having shell access enabled by default on all accounts presents a  security risk. A shell account gives the user a direct window into  our system. By minimizing the number of active shell accounts, we  minimize the risk of compromising our system.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Can I choose my shell type?==&lt;br /&gt;
Yes. You can choose from bash, tcsh, sh, zsh, csh, and ksh. We recommend using either bash or csh, at first, since they&#039;re the most user-friendly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is SSH and how do I use it?==&lt;br /&gt;
SSH is a secure shell. Using it is differs, depending on the operating  system.  Mac OS X is probably the easiest. Nothing special has to be installed.  Simply open a terminal window and &amp;lt;tt&amp;gt;ssh username@shell.xmission.com&amp;lt;/tt&amp;gt;.  Accept the key and enter your password.  For most Windows operating systems, an SSH client must be used. There  are many SSH clients on the market and a few are &amp;quot;freeware&amp;quot;. PuTTY is a recommended free SSH client for Windows. Some places to look for additional SSH software would be Download.com and Tucows.com.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are my telnet software options?==&lt;br /&gt;
Currently this Option is not available&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;s&amp;gt;There are dozens of telnet/terminal applications available. Though  applications are installed by default for Windows (Telnet) and Mac  OS X (Terminal), you may choose to download a telnet program with  more features. Some places to look for this software would be Download.com  and Tucows.com. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;messagebox metadata&amp;quot;&amp;gt;&#039;&#039;&#039;Note&#039;&#039;&#039;: Since browsers will look for the default telnet application when installed, an easy way to start the application is to enter &amp;lt;tt&amp;gt;telnet shell.xmission.com&amp;lt;/tt&amp;gt; in the address bar in your browser.&amp;lt;/div&amp;gt;&amp;lt;/s&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Why don&#039;t my screen and text work properly?==&lt;br /&gt;
There are two typical problems that occur during a telnet session.  The first and most common problem is incorrect terminal emulation.  The second problem occurs after a screen has been messed up by viewing  a binary file.&lt;br /&gt;
 &lt;br /&gt;
The most commonly used terminal emulation is vt100, though vt220  is supported and recommended. To change the terminal emulation of  your telnet application, view the preferences and choose either vt100  or vt220. However, even after specifying the terminal emulation for  your telnet application, you may still have problems correctly displaying  columns and rows. For this, you&#039;ll need to define the default size  of your window in your run commands (explained below]).  When trying to fix a screen after viewing a binary file, run &amp;lt;tt&amp;gt;fixvt&amp;lt;/tt&amp;gt; at a command prompt.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are some common commands I&#039;ll need to know when using the UNIX shell?==&lt;br /&gt;
The most common commands you&#039;ll need to know are &amp;lt;tt&amp;gt;cd&amp;lt;/tt&amp;gt; (changes your directory), &amp;lt;tt&amp;gt;pwd&amp;lt;/tt&amp;gt; (shows your current directory path), and &amp;lt;tt&amp;gt;ls&amp;lt;/tt&amp;gt; (lists the contents of the current directory). For a more complete list of common commands, please see our Common Commands page. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why do I get &amp;quot;command not found&amp;quot; when using a command I&#039;m sure should work? ==&lt;br /&gt;
It&#039;s possible that you don&#039;t have the paths to the command directories defined correctly in your run commands. For instructions on defining the correct paths, see below. &lt;br /&gt;
&lt;br /&gt;
==How do I edit my shell run commands (rc) file?==&lt;br /&gt;
Your shell run commands are found in a file named &#039;&#039;.cshrc&#039;&#039; (for c shell),  &#039;&#039;.bashrc&#039;&#039; (for borne shell), &#039;&#039;.kshrc&#039;&#039; (for korn shell), etc. This file  will be located in your home directory (/home/users/u/username). It  contains commands that are run when you first log on to set your  paths, environment variables, and aliases. Before changing ANY rc file, it&#039;s recommended you make a back-up copy.&lt;br /&gt;
&lt;br /&gt;
To set or edit your paths, edit your run commands file with a text  editor (pico, vi, ed, etc.). Your paths will be defined after the  command &amp;lt;tt&amp;gt;set path =&amp;lt;/tt&amp;gt;. The default paths should be &amp;lt;tt&amp;gt;/bin /usr/local/bin  /usr/bin&amp;lt;/tt&amp;gt;. If you&#039;d like to add a path, simply add it to the end,  separated by a space. (e.g.: /home/users/u/username/morecommands/)  If you&#039;d like to edit what information is displayed in your prompt,  edit the &amp;lt;tt&amp;gt;set prompt=&amp;lt;/tt&amp;gt; variable. A useful way to define your prompt  is to have it display your current directory. To do this, remove the  default &amp;lt;tt&amp;gt;set prompt=&amp;lt;/tt&amp;gt; and enter this in its place:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;alias cd &#039;cd \!* ; set prompt=&amp;quot;&#039;hostname&#039;:&#039;pwd&#039;&amp;gt; &amp;quot;&#039;&amp;lt;/tt&amp;gt;  To edit your environment variables, first type &amp;lt;tt&amp;gt;env&amp;lt;/tt&amp;gt; at a command  prompt to show your current variables. If you&#039;d like to change any  of these, enter the definition after a new &amp;quot;setenv&amp;quot; line. The proper  syntax, as you&#039;ll see in the default settings, is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;setenv VARIABLE_NAME path/or/command:/2nd/path/or/command/&amp;lt;/tt&amp;gt;  Adding an alias is fairly simple. If you&#039;d like a certain command  to be run when you type something in at the command prompt, you&#039;d  enter that here. The proper syntax is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;alias aliasedcommand &#039;realcommand -options&#039;&amp;lt;/tt&amp;gt;  This is also where you define your terminal emulation settings.&lt;br /&gt;
&amp;lt;tt&amp;gt;setenv TERM vt100   &amp;lt;/tt&amp;gt;(sets terminal type)&lt;br /&gt;
&amp;lt;tt&amp;gt;/bin/stty rows 24   &amp;lt;/tt&amp;gt;(sets number of rows)&lt;br /&gt;
&amp;lt;tt&amp;gt;/bin/stty cols 80   &amp;lt;/tt&amp;gt;(sets number of columns)&lt;br /&gt;
&amp;lt;tt&amp;gt;/bin/stty erase ^H   &amp;lt;/tt&amp;gt;(sets backspace command)  &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are all these files in my home directory, and what are they for?==&lt;br /&gt;
If you do a complete list, showing hidden files, of your home directory,  you will notice that there are several files already there. The files  are listed and explained in the table below. Some of these files will  not be there by default, but only appear if the application that uses  them is run. &lt;br /&gt;
&lt;br /&gt;
===Types===&lt;br /&gt;
rc run commands/preferences (usually, but not always)&lt;br /&gt;
&lt;br /&gt;
===Files===&lt;br /&gt;
.cshrc shell run commands(for csh or tcsh) .gopherrc gopher preferences .login shell preferences (read after run commands at login) .newsrc news preferences .nn Network News Reader preferences .pinerc Pine preferences (pine is primarily used for email) .tin Threaded Internetwork News preferences&lt;br /&gt;
&lt;br /&gt;
===Directories===&lt;br /&gt;
bin can contain scripts or binary executables ftp your personal directory for file transfer mail Email is stored here (used by pine and others) news articles are saved here by default public_html your web pages&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I alter the information shown in my prompt?==&lt;br /&gt;
If you use tcsh, changing the prompt is as simple as entering the command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;set prompt=&amp;quot;options&amp;quot;&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
However, with other shells, you will need to edit the &amp;lt;tt&amp;gt;set prompt=&amp;lt;/tt&amp;gt; line in your shell run commands file (shown above). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What program can I use to read email from a shell? ==&lt;br /&gt;
&lt;br /&gt;
Probably the most popular options are &#039;&#039;mutt&#039;&#039; (recommended) and &#039;&#039;pine&#039;&#039;, but &#039;&#039;elm&#039;&#039;, &#039;&#039;mail/rmail&#039;&#039;, and &#039;&#039;emacs&#039;&#039; are also available. At a command prompt, run the command &amp;lt;tt&amp;gt;mutt&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;pine&amp;lt;/tt&amp;gt;, or &amp;lt;tt&amp;gt;elm&amp;lt;/tt&amp;gt; and the mail client will open, also creating either a /mail (pine and elm) or /Mail (mutt) directory. Using mail/rmail &lt;br /&gt;
or emacs isn&#039;t quite as intuitive. It&#039;s recommended that you read the manual before using. (Type &amp;lt;tt&amp;gt;man mail&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;man emacs&amp;lt;/tt&amp;gt; at a command prompt.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What program can I use to read news (Usenet) from a shell?==&lt;br /&gt;
The newsreaders available on shell are slrn, tin, nn, pine, nmh, trn, and emacs. The most popular ones would be slrn, tin, nn, and pine. We recommend slrn, since it&#039;s the only one that still has development. For more information on how to use any of these programs, type &amp;quot;man&amp;quot; followed by the program name at the command prompt (e.g.: &amp;lt;tt&amp;gt;man tin&amp;lt;/tt&amp;gt;). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How do I kill a process? ==&lt;br /&gt;
Before you kill a processes, you have to have its processes ID. You get this by typing &amp;quot;ps&amp;quot; at the command prompt. Once you&#039;ve determined which one of your processes is the one you want to kill, type &amp;lt;tt&amp;gt;kill -9 PID&amp;lt;/tt&amp;gt; (where PID is the actual processes ID) at the command prompt. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Is there a way to transfer files to and from my XMission account other than FTP?==&lt;br /&gt;
Although FTP is the recommended way to transfer files to and from your XMission account, it&#039;s not the only way. SFTP (ssh ftp) works directly to shell.xmission.com.&lt;br /&gt;
&lt;br /&gt;
==How do I compress and decompress files? ==&lt;br /&gt;
The method you&#039;ll use to decompress a file is determined by looking at the file extension. The instructions below show how to decompress the file in the current directory. For further information, see the &lt;br /&gt;
manual for each program (tar, bzip, unzip, gzip, uncompress).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.tar    &amp;lt;/tt&amp;gt;&amp;lt;tt&amp;gt;tar xvf file.tar&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.Z   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;uncompress file.Z&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.gz   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;gzip -d file.gz&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.zip   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;unzip file.zip&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;file.bz2   &amp;lt;/tt&amp;gt; &amp;lt;tt&amp;gt;bzip2 -d file.bz2&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If there is a combination of formats, such as file.tar.gz, you can &lt;br /&gt;
either pipe one command to the other (e.g. &amp;lt;tt&amp;gt;gzip -d file.tar.gz | tar &lt;br /&gt;
xvf&amp;lt;/tt&amp;gt;), or see if the option is supported by tar (&amp;lt;tt&amp;gt;man tar&amp;lt;/tt&amp;gt;&amp;gt;. Using the command &lt;br /&gt;
&amp;lt;tt&amp;gt;tar xvfz file.tar.gz&amp;lt;/tt&amp;gt; will handle both the gzip compression and the &lt;br /&gt;
tar compression. When piping a .Z file, however, be sure to use &amp;lt;tt&amp;gt;zcat &lt;br /&gt;
file.Z&amp;lt;/tt&amp;gt; (the equivalent of &amp;lt;tt&amp;gt;uncompress -c file.Z&amp;lt;/tt&amp;gt;, which writes to standard &lt;br /&gt;
output the files that were compressed). A similar rule applies to &lt;br /&gt;
bzip2, where you should use &amp;lt;tt&amp;gt;bzcat file.bz2&amp;lt;/tt&amp;gt; (equal to &amp;lt;tt&amp;gt;bzip2 -dc file.bz2&amp;lt;/tt&amp;gt;) &lt;br /&gt;
when piping the output to another command. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What are some basics on setting permissions with &amp;quot;chmod&amp;quot;?==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
First, an understanding of file/directory ownership is needed. Each &lt;br /&gt;
file or directory has a user (also the owner) and a group. The owner &lt;br /&gt;
of your files should always be your XMission username. The groups &lt;br /&gt;
you&#039;ll need to know are www (which gives the web server access to &lt;br /&gt;
the files) and users (which gives any of XMission&#039;s users, from shell, &lt;br /&gt;
access to the files). There&#039;s also the category, others, that includes &lt;br /&gt;
any user or group.&lt;br /&gt;
&lt;br /&gt;
Permissions are based on those three categories: owner, group, and &lt;br /&gt;
others. When you do a long listing of the file (&amp;lt;tt&amp;gt;ls -l filename&amp;lt;/tt&amp;gt;), the &lt;br /&gt;
permissions will be displayed to the left. The format is shown as &lt;br /&gt;
such: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;-rw-r--r-- 1 acctname group 1949 Sep &lt;br /&gt;
19 2000 file.html&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The first space defines weather the file is a simple file (shown with a hyphen) or a directory (shown with a d). The next three spaces represent the permissions (highlighted in red) &lt;br /&gt;
for the owner, the next three are for the group, and the last three &lt;br /&gt;
are for others. The letters represent what kind of permissions are &lt;br /&gt;
allowed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;r &#039;&#039;&#039; = Read (view and make copies)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;w &#039;&#039;&#039; = Write (make changes to or delete)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;x &#039;&#039;&#039; = Execute (run program/script) &lt;br /&gt;
When using &amp;quot;chmod&amp;quot; to change permissions, you will need to specify &lt;br /&gt;
the category by using one or a combination of the following letters:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;u &#039;&#039;&#039; = User (Owner)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;g &#039;&#039;&#039; = Group&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;o &#039;&#039;&#039; = Others&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;a &#039;&#039;&#039; = All (same as using &amp;quot;ugo&amp;quot;) &lt;br /&gt;
To change the permissions, execute &amp;quot;chmod&amp;quot; with the following parameters:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod who+/-/=permission file&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The plus (+) adds the following permission, the minus (-) removes &lt;br /&gt;
it, and the (=) adds it, discarding any previous permissions. Some &lt;br /&gt;
examples:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod g+r file.html&amp;lt;/tt&amp;gt; (adds read access for group)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod go-r file.html&amp;lt;/tt&amp;gt; (removes read access from group and &lt;br /&gt;
others)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod a=x file.html&amp;lt;/tt&amp;gt; (replaces existing permissions with read &lt;br /&gt;
access for all)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod g+rx file.html&amp;lt;/tt&amp;gt; (adds read and execute access for group) &lt;br /&gt;
There is another way to change permissions without having to write &lt;br /&gt;
out &amp;lt;tt&amp;gt;chmod who+/-/=permission file&amp;lt;/tt&amp;gt; every time. This method uses a 3-digit octal &lt;br /&gt;
number. Determining the octal number is fairly easy after some practice. &lt;br /&gt;
To start, refer to the chart below. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Symbol &#039;&#039;&#039; &#039;&#039;&#039;Octal &#039;&#039;&#039;---0--x1-w-2-wx3r--4r-x5rw-6rwx7&amp;lt;/td&amp;gt;&lt;br /&gt;
For example, if you&#039;d like to set the permissions on file.html &lt;br /&gt;
to be &amp;lt;tt&amp;gt;-rw-r--r--&amp;lt;/tt&amp;gt; you would determine the octal number &lt;br /&gt;
like this (skip the first space in the set): &lt;br /&gt;
&amp;lt;tt&amp;gt;rw-&amp;lt;/tt&amp;gt; = 6, &amp;lt;tt&amp;gt;r--&amp;lt;/tt&amp;gt; = 4, &amp;lt;tt&amp;gt;r--&amp;lt;/tt&amp;gt; = 4. The octal &lt;br /&gt;
number is 644. &lt;br /&gt;
 To execute the command, type:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod 644 file.html&amp;lt;/tt&amp;gt; &lt;br /&gt;
&amp;lt;div class=&amp;quot;messagebox metadata&amp;quot;&amp;gt;&#039;&#039;&#039;Note&#039;&#039;&#039;: This would be the same as using:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;chmod a+r file.html&lt;br /&gt;
&lt;br /&gt;
chmod u+x file.html&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(if no permissions were previously set). &amp;lt;/div&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Changing ownership and the group of a file would normally be done &lt;br /&gt;
with &amp;quot;chown&amp;quot; and &amp;quot;chgrp&amp;quot;. However, because these commands are restricted &lt;br /&gt;
to the user and group being specified, you&#039;re unable to use them on &lt;br /&gt;
XMission (because you&#039;re only one user and you&#039;re only a member of &lt;br /&gt;
one group). However, if you&#039;d like a file to belong to the group www, &lt;br /&gt;
you can either create it in or upload it to your public_html directory. &lt;br /&gt;
This will set the group, by default, to www. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FAQ|Shell Access]]&lt;br /&gt;
[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:Getting Started]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Hosted_Email:iOS&amp;diff=10797</id>
		<title>Hosted Email:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Hosted_Email:iOS&amp;diff=10797"/>
		<updated>2020-11-16T02:35:18Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: update link for &amp;quot;tapping here&amp;quot; at the bottom&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This iOS profile is specific to Premium Edition mailboxes on the XMission Zimbra Collaboration platform. &lt;br /&gt;
&lt;br /&gt;
==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your iOS device and then &lt;br /&gt;
&#039;&#039;&#039;[https://asset.xmission.com/xmission-zimbra-premium-signed.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
This profile will sync all your Mail, Contacts, personal Calendars, as well as the Notes and Reminders the iOS device provides. &lt;br /&gt;
&lt;br /&gt;
This profile will not sync any calendars shared with you by other mailboxes on your domain.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note:&#039;&#039; Clients with any shared calendars should [https://wiki.xmission.com/Hosted_Email:iOS#Profile_for_Multiple_Calendars use this calendar sharing profile linked below].   or disable calendars and reminders in the iOS settings and then manually configure those using CalDAV.&lt;br /&gt;
&lt;br /&gt;
Shortcut: [http://url.xmission.com/iosp http://url.xmission.com/iosp] is an easily shareable link to use when installing.&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission Zimbra Premium launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
[[Image:Ios-zimbra-premium-1.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your device&#039;s lock code or password: ====&lt;br /&gt;
[[Image:Ios-zimbra-premium-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address: ====&lt;br /&gt;
&lt;br /&gt;
If you have purchased Hosted Email for another domain other than @xmission.com, enter that email address with that domain.&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address again: ====&lt;br /&gt;
If you have purchased Hosted Email for another domain other than @xmission.com, enter that email address with that domain.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your password: ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-5.png]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;br /&gt;
&lt;br /&gt;
=== Deleting the Profile ===&lt;br /&gt;
If you no longer want this configuration on your device, you can remove the profile.&lt;br /&gt;
&lt;br /&gt;
# Go into Settings&lt;br /&gt;
# Click General&lt;br /&gt;
# Click on &amp;quot;Profile&amp;quot;&lt;br /&gt;
# Click on the XMission profile&lt;br /&gt;
# Delete the Profile.&lt;br /&gt;
&lt;br /&gt;
=== Profile for Multiple Calendars ===&lt;br /&gt;
&lt;br /&gt;
Hosted Email clients with shared calendars should utilize this profile by &#039;&#039;&#039;[https://asset.xmission.com/xmission-zimbra-premium-caldav-signed.mobileconfig tapping here]&#039;&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
Requirements:&lt;br /&gt;
&lt;br /&gt;
You &#039;&#039;&#039;must disable&#039;&#039;&#039; the Calendars and Reminders inside iOS &amp;quot;Mail&amp;quot; and &amp;quot;Calendar&amp;quot; Settings for &amp;quot;XMission Zimbra Mail &amp;amp; Contacts&amp;quot;. The &amp;quot;XMission Zimbra Calendars &amp;amp; Reminders&amp;quot; entry will provide this functionality.&lt;br /&gt;
&lt;br /&gt;
Turn off the &amp;quot;[ ] Enable delegation for Apple iCal CalDAV client&amp;quot; setting inside Zimbra webmail Preferences / Calendar. Be sure to &amp;quot;Save&amp;quot; the setting inside webmail and then refresh your calendars on the iOS device.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Proxy&amp;diff=10156</id>
		<title>Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Proxy&amp;diff=10156"/>
		<updated>2020-04-10T21:04:29Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: Add STUN and SOCKS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Proxy Servers&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
An HTTP, or web, proxy server provides a gateway between your browser and the rest of the Internet. A proxy server replaces your identity (IP address, in this case) with its own, making it possible to browse more privately, securely, and can offer additional features depending upon the proxy. XMission now provides four different web proxies. Information about each is listed below.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Dial-up Web Accelerator&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Our dial-up accelerator transparently compresses and caches web documents (i.e., text and html) locally to cut down on load time. Downloading compressed and cached web pages through XMission can speed up web browsing for dial-up users. To use this service, find your browser on our [[Web Accelerator|Dial-up Web Accelerator Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Privoxy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Privoxy is geared towards filtering pop-up advertisements and regular web advertisements. XMission had previously offered a proxy called &amp;quot;Junkbuster&amp;quot; for the same purpose. Privoxy is based off Junkbuster but provides better filtering. Privoxy also provides all of the features offered by the &amp;quot;Normal Caching Proxy&amp;quot;. If you wish to use this service, find your browser on our [[Privoxy Usage]] instruction page.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;DansGuardian&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
DansGuardian is a web proxy capable of [[Content Filtering|filtering]] out web content (sex, drugs, profanity, violence, etc.) some might consider offensive. DansGuardian also offers all of the features offered by &amp;quot;Privoxy&amp;quot; and the &amp;quot;Normal Caching Proxy&amp;quot;.  If you wish to use this service, visit our [[DansGuardian User Agreement|DansGuardian Usage]] page.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Normal Caching Proxy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Our normal proxy transparently caches web documents locally to cut down on load time. Downloading a web page from an XMission server is faster than downloading one from across the Internet. If you wish to use this service, find your browser on our [[Caching Proxy]] instruction page.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;SOCKS v4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SOCKS v4 proxy services are available for customers inside the XMission network via socks.xmission.com.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Session Traversal Utilities for NAT ([[https://en.wikipedia.org/wiki/STUN STUN]]) Server&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A public STUN server is available for customer and non-customer use alike.  STUN servers are primarily used for VoIP services traversing a NAT network.  It is available at stun.xmission.com with the secondary interface at stun2.xmission.com, UDP ports 3478 and 3479.&lt;br /&gt;
&lt;br /&gt;
{{Footer}}&lt;br /&gt;
[[Category:Proxies]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Email:iOS&amp;diff=7601</id>
		<title>XMission Email:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Email:iOS&amp;diff=7601"/>
		<updated>2016-04-19T00:09:43Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: /* You will see the &amp;quot;Install Profile&amp;quot; for XMission launch.  Tap the Install button. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your device and then &lt;br /&gt;
&#039;&#039;&#039;[http://asset.xmission.com/xmission.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-1.png]]&lt;br /&gt;
&lt;br /&gt;
==== It may as for your device&#039;s pass code upon installation, this is what you use to unlock your device. ====&lt;br /&gt;
&lt;br /&gt;
==== Enter your full name:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission email:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission account name (the part without @xmission.com):====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission password:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-5.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission account name again:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-6.png]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;br /&gt;
&lt;br /&gt;
==== Delete the Profile ====&lt;br /&gt;
If you want to remove this configuration, this is how you delete the profile.  Do not remove the profile if you want to keep the configuration.&lt;br /&gt;
&lt;br /&gt;
# Go into Settings&lt;br /&gt;
# Click General&lt;br /&gt;
# Click on &amp;quot;Profile&amp;quot;&lt;br /&gt;
# Click on the XMission profile&lt;br /&gt;
# Delete the Profile.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Email:iOS&amp;diff=7600</id>
		<title>XMission Email:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Email:iOS&amp;diff=7600"/>
		<updated>2016-04-19T00:06:33Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: fix the wording on deleting the profile&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your device and then &lt;br /&gt;
&#039;&#039;&#039;[http://asset.xmission.com/xmission.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-1.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your full name:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission email:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission account name (the part without @xmission.com):====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission password:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-5.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission account name again:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-6.png]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;br /&gt;
&lt;br /&gt;
==== Delete the Profile ====&lt;br /&gt;
If you want to remove this configuration, this is how you delete the profile.  Do not remove the profile if you want to keep the configuration.&lt;br /&gt;
&lt;br /&gt;
# Go into Settings&lt;br /&gt;
# Click General&lt;br /&gt;
# Click on &amp;quot;Profile&amp;quot;&lt;br /&gt;
# Click on the XMission profile&lt;br /&gt;
# Delete the Profile.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Hosted_Email:iOS&amp;diff=7153</id>
		<title>Hosted Email:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Hosted_Email:iOS&amp;diff=7153"/>
		<updated>2015-08-21T20:32:34Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: explain&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your device and then &lt;br /&gt;
&#039;&#039;&#039;[https://asset.xmission.com/xmission-zimbra-premium-signed.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission Zimbra Premium launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
[[Image:Ios-zimbra-premium-1.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your device&#039;s lock code or password: ====&lt;br /&gt;
[[Image:Ios-zimbra-premium-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address: ====&lt;br /&gt;
&lt;br /&gt;
If you have purchased Hosted Email for another domain other than @xmission.com, enter that email address with that domain.&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address again: ====&lt;br /&gt;
If you have purchased Hosted Email for another domain other than @xmission.com, enter that email address with that domain.&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your password: ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-5.png]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;br /&gt;
&lt;br /&gt;
=== Deleting the Profile ===&lt;br /&gt;
If you no longer want this configuration on your device, you can remove the profile.&lt;br /&gt;
&lt;br /&gt;
# Go into Settings&lt;br /&gt;
# Click General&lt;br /&gt;
# Click on &amp;quot;Profile&amp;quot;&lt;br /&gt;
# Click on the XMission profile&lt;br /&gt;
# Delete the Profile.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Hosted_Email:iOS&amp;diff=7152</id>
		<title>Hosted Email:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Hosted_Email:iOS&amp;diff=7152"/>
		<updated>2015-08-21T20:17:26Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: /* Delete the Profile */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your device and then &lt;br /&gt;
&#039;&#039;&#039;[https://asset.xmission.com/xmission-zimbra-premium-signed.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission Zimbra Premium launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
[[Image:Ios-zimbra-premium-1.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your device&#039;s lock code or password: ====&lt;br /&gt;
[[Image:Ios-zimbra-premium-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address: ====&lt;br /&gt;
&lt;br /&gt;
If you have purchased Hosted Email for another domain other than @xmission.com, enter that email address with that domain.&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address again: ====&lt;br /&gt;
If you have purchased Hosted Email for another domain other than @xmission.com, enter that email address with that domain.&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your password: ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Ios-zimbra-premium-5.png]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;br /&gt;
&lt;br /&gt;
=== Delete the Profile ===&lt;br /&gt;
# Go into Settings&lt;br /&gt;
# Click General&lt;br /&gt;
# Click on &amp;quot;Profile&amp;quot;&lt;br /&gt;
# Click on the XMission profile&lt;br /&gt;
# Delete the Profile.&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=XMission_Email:iOS&amp;diff=7089</id>
		<title>XMission Email:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=XMission_Email:iOS&amp;diff=7089"/>
		<updated>2015-07-02T14:43:06Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: remove godaddy x.co, embolden link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your device and then &lt;br /&gt;
&#039;&#039;&#039;[http://asset.xmission.com/xmission.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-1.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your full name:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission email:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission account name (the part without @xmission.com):====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission password:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-5.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Enter your XMission account name again:====&lt;br /&gt;
&lt;br /&gt;
[[Image:ios7-6.png]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Zimbra_Email_Client_Configurations&amp;diff=7088</id>
		<title>Zimbra Email Client Configurations</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Zimbra_Email_Client_Configurations&amp;diff=7088"/>
		<updated>2015-07-02T14:39:16Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: update for apple ios devices&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__ &lt;br /&gt;
&lt;br /&gt;
These easy to follow instructions will help you configure your favorite client for use with your Zimbra email service.&amp;lt;br/&amp;gt;&lt;br /&gt;
For greater convenience, you can always access your mail at https://zimbra.xmission.com/&lt;br /&gt;
&lt;br /&gt;
For more help, This link will take you to a video repository of helpful tips: http://help.zimbra.com/videos/8x/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2 style=&amp;quot;padding-top:1.5em&amp;quot;&amp;gt;Recommended Email Settings&amp;lt;/h2&amp;gt;&lt;br /&gt;
{| style=&amp;quot;text-align: left; border: 1px solid #ccc;&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot; &lt;br /&gt;
! style=&amp;quot;border-bottom:1px solid #ccc; background-color: #eef; padding:2px 8px&amp;quot; colspan=2 | Incoming Server Information:&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 0 0 1px 1px; border-color:#ccc; background-color: #eef; padding:2px 8px&amp;quot; colspan=2 | Outgoing Server Information:&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;padding:2px 8px&amp;quot; |Server Type: || IMAP&lt;br /&gt;
|style=&amp;quot;border-left:1px solid #ccc; padding:2px 8px&amp;quot; | Server Type: || SMTP&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;padding:2px 8px&amp;quot; |Hostname: || zimbra.xmission.com&lt;br /&gt;
|style=&amp;quot;border-left:1px solid #ccc; padding:2px 8px&amp;quot; | Hostname: || zimbra.xmission.com &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;padding:2px 8px&amp;quot; |Port: || 993&lt;br /&gt;
|style=&amp;quot;border-left:1px solid #ccc; padding:2px 8px&amp;quot; | Port: || 465&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;padding:2px 8px&amp;quot; |Encryption Type: || SSL&lt;br /&gt;
|style=&amp;quot;border-left:1px solid #ccc; padding:2px 8px&amp;quot; | Encryption Type: || SSL&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;padding:2px 8px&amp;quot; |Authenticate Using: || Clear Text/Normal Password&lt;br /&gt;
|style=&amp;quot;border-left:1px solid #ccc; padding:2px 8px&amp;quot; | Requires Authentication: || Yes&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;padding:2px 8px&amp;quot; |Logon User Name: || Your full email address &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;border-left:1px solid #ccc; padding:2px 8px&amp;quot; | ||&lt;br /&gt;
|}&lt;br /&gt;
- Please note that some free wireless hotspots may block SSL without an extra fee. If you cannot send or receive while on certain wifi networks (especially ones in airports or public spaces) please check their terms and conditions and ensure they are not blocking SSL connections.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Windows 8.x / 7 / Vista&amp;lt;/h2&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Although XP will still work - it is no longer Supported&#039;&#039;&#039;&lt;br /&gt;
*[[Hosted_Email:Outlook_Express|Outlook Express]]&lt;br /&gt;
*[[Hosted_Email:Windows_Mail|Windows Live Mail]]&lt;br /&gt;
*[[Outlook 2003]]&lt;br /&gt;
*[[Hosted_Email:Outlook_2007|Outlook 2007]]&lt;br /&gt;
*[[Hosted_Email:Outlook_2010|Outlook 2010]]&lt;br /&gt;
*[[Hosted_Email:Outlook_2013|Outlook 2013]]&lt;br /&gt;
*[[Hosted_Email:Outlook_Connector|Outlook Connector for Zimbra Premium]] and Personal Premium Zimbra accounts&lt;br /&gt;
*[[Hosted_Email:Thunderbird_Setup|Thunderbird 3]]&lt;br /&gt;
*[[Hosted_Email:Zimbra_Desktop|Zimbra Desktop]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Mac OS X&amp;lt;/h2&amp;gt;&lt;br /&gt;
*[[Hosted_Email:MacMail_7.x|Mac Mail 7.x]]&lt;br /&gt;
**[[Hosted_Email:Calendar_Sync_OSX|Calendar Sync]] - for Personal Premium and Zimbra Business accounts&lt;br /&gt;
**[[Hosted_Email:Contacts_Sync_OSX|Contacts Sync]] - for Personal Premium and Zimbra Business accounts&lt;br /&gt;
*[[Hosted_Email:MacMail_3|Mac Mail 3.x]]&lt;br /&gt;
*[[Hosted_Email:Thunderbird_Mac|Thunderbird Mac]]&lt;br /&gt;
*[[Hosted_Email:Mutt|Mutt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Linux&amp;lt;/h2&amp;gt;&lt;br /&gt;
*[[Hosted_Email:Thunderbird_Setup_Linux|Thunderbird Linux]]&lt;br /&gt;
*[[Hosted_Email:Evolution|Evolution Mail]]&lt;br /&gt;
*[[Hosted_Email:Mutt|Mutt]]&lt;br /&gt;
*[[Hosted_Email:Claws|Claws]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Mobile&amp;lt;/h2&amp;gt;&lt;br /&gt;
*[[Hosted Email Base:iOS|Apple iOS Devices - iPhone/iPad]] - Zimbra Base and Standard Accounts&lt;br /&gt;
*[[Hosted_Email:iOS|Apple iOS Devices - iPhone/iPad]] - Zimbra Premium Account configuration&lt;br /&gt;
*[[Hosted_Email:Android|Android]]&lt;br /&gt;
*[[Hosted_Email:Windows_Mobile|Windows Mobile &amp;amp; Windows Phone 8]]&lt;br /&gt;
*[[Hosted_Email:BlackBerry|BlackBerry IMAP]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|Zimbra]]&lt;br /&gt;
[[Category:Zimbra]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Hosted_Email_Base:iOS&amp;diff=7087</id>
		<title>Hosted Email Base:iOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Hosted_Email_Base:iOS&amp;diff=7087"/>
		<updated>2015-07-02T14:37:57Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: initial hosted email base overhaul&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Download the Profile ====&lt;br /&gt;
Download the XMission email profile by loading this webpage on your device and then &lt;br /&gt;
&#039;&#039;&#039;[https://asset.xmission.com/xmission-zimbra-base-signed.mobileconfig tapping here]&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== You will see the &amp;quot;Install Profile&amp;quot; for XMission Zimbra Base launch.  Tap the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
[[Image:Ios-zimbra-base-1.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your device&#039;s lock code or password: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-2.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Press the &#039;&#039;&#039;Install&#039;&#039;&#039; button. ====&lt;br /&gt;
[[Image:Ios-zimbra-base-3.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your full name: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-4.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-5.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address again: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-6.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your password: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-7.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address again: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-8.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your email address one last time: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-9.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Enter your password again: ====&lt;br /&gt;
[[Image:Ios-zimbra-base-10.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== You are finished! ====&lt;br /&gt;
[[Image:Ios-zimbra-base-11.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Email Configuration|XMission Email|iPhone / iPad]]&lt;br /&gt;
[[Category:XMission Email|iPhone / iPad]]&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=File:Ios-zimbra-base-11.png&amp;diff=7086</id>
		<title>File:Ios-zimbra-base-11.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=File:Ios-zimbra-base-11.png&amp;diff=7086"/>
		<updated>2015-07-02T14:30:54Z</updated>

		<summary type="html">&lt;p&gt;Pashdown: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Pashdown</name></author>
	</entry>
</feed>