Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

makehosts(8) [ultrix man page]

MAKEHOSTS(8)						      System Manager's Manual						      MAKEHOSTS(8)

Name
       MAKEHOSTS - make symbolic links to hosts

Syntax
       /usr/hosts/MAKEHOSTS

Description
       The  command creates symbolic links to the command for each of the hosts as defined in the file.  If the file does not exist, then the com-
       mand creates the links for each of the hosts listed in the local file.  The resulting symbolic links populate the directory.

       The symbolic links are a convenience that allows users to type the name of a remote host on the network to log into that host.	For  exam-
       ple, the following command logs you into a remote host called
       # chicago
       If  you do not create the symbolic links, you must use the command to log into a remote host.  For example, to log into a remote host named
       type:
       # rlogin chicago

See Also
       rlogin(1c), rsh(1c), hosts(5), svc.conf(5)

4th Berkeley Distribution													      MAKEHOSTS(8)

Check Out this Related Man Page

rhosts(4)						     Kernel Interfaces Manual							 rhosts(4)

NAME
rhosts, .rhosts - Specifies remote users that can use a local user account SYNOPSIS
$HOME/.rhosts DESCRIPTION
The .rhosts file contains a list of remote users who are not required to supply a login password when they execute the rcp, rlogin, and rsh commands using a local user account. The .rhosts file is a hidden file in your home directory. It must be owned by you or the root user and it must not be writable by group or world, otherwise, it is not used. Moreover, although it is not required, it is sensible to set the permissions of the file to 600, so the file is not readable by group or world. Each entry in the file is of the following form: host [user] where: The name of the remote host. If the remote host is in a different domain than the local host, the full domain name must be speci- fied. The login name of the remote user. This field is optional. If this field is not specified, any user on the specified remote host is exempt from providing a password, and is assumed to have the same username on both the local and remote hosts. Optionally, an NIS netgroup name can be specified for the host name, user name, or both. Entries in the .rhosts file are either positive or negative. Positive entries allow access; negative entries deny access. The following entries are positive: hostname username +@netgroup In addition, the plus sign (+) can be used in place of the hostname or username. In place of the hostname, it means any remote host. In place of the username, it means any user. The following entries are negative: -hostname -username -@netgroup EXAMPLES
The following sample entries in the /u/chen/.rhosts file on host zeus allow users moshe and pierre at remote host venus and user robert at the hosts specified in the NIS netgroup chicago to log in to user chen's home directory on host zeus: venus moshe venus pierre +@chicago robert FILES
Specifies remote users who can use a local user account. RELATED INFORMATION
Commands: rcp(1), rlogin(1), rsh(1). Functions: ruserok(3). Files: hosts.equiv(4), netgroup(4). Functions: rcmd(3). delim off rhosts(4)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies