03-01-2002
online monitoring
aehm just one question.
is there a simple command to watch all online users, and their connection (ftp,ssh, etc...) also remote!
Or do you know a good tool for it.
thanks
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I was just on Suns website and found that you can actually download Solaris 8 and not have to pay the licensing fee. You can also purchase the OS on CD's for $75.00.
It seems also that Gnome 1.4 is supported too on Solaris 8 which would make the OS as easy to use as any Linux Distribution.
... (1 Reply)
Discussion started by: brianfreer
1 Replies
2. UNIX for Dummies Questions & Answers
If anyone can tell me the difference between the three or where I can find more info I would appreciated it. I see alot of companies looking for people with knowledge in Unix but every time I try to find information about it I see Linux instead.
Is there a market trend in these operating... (2 Replies)
Discussion started by: ITmommy
2 Replies
3. Programming
I need to compile a file,but 'make' does
not work.please tell me how to use it or
need which tools? (3 Replies)
Discussion started by: dsun5
3 Replies
4. Shell Programming and Scripting
I wonder how I shall read the result below, especially 'what'
shown below.
The result was shown when I entered 'w'.
E.g what is TOP? What is gosh ( what does selmgr mean?)?
login@ idle JCPU PCPU what
6:15am 7:04 39 39 TOP
6:34am 6:45 45 45 TOP
6:41am ... (1 Reply)
Discussion started by: Aelgen
1 Replies
5. UNIX Desktop Questions & Answers
Currently attemting to load Solaris v8 onto a laptop, but having no luck with the display settings. Need to know which video/display settings work for a Compaq Presario 1200xl 325 model...
I am using the default low-res type settings to get a black and white picture with huge icons.
Been to... (1 Reply)
Discussion started by: StaleMate
1 Replies
6. UNIX for Dummies Questions & Answers
echo 'it's friday'
why appear the > (3 Replies)
Discussion started by: yls177
3 Replies
7. UNIX for Advanced & Expert Users
can someone tell me what could cause an application not to startup? I'm getting calls from users saying they cant' startup a particular application. how do I troubleshoot this?
i tried doing ps -ef | grep (application)
i saw the application running. now, am wondering, would it be safe to... (1 Reply)
Discussion started by: TRUEST
1 Replies
8. UNIX for Advanced & Expert Users
Somehow someone created a file named '-ov' in the root directory.
Given the name, the how was probably the result of some cpio command they bozo'ed.
I've tried a number of different ways to get rid of it using * and ? wildcards, '\' escape patterns etc.. They all fail with " illegal option --... (3 Replies)
Discussion started by: GSalisbury
3 Replies
9. Shell Programming and Scripting
Hopefully this doesn't come off as too much of a "newbie" question or a flamebait. But I have recently begun working with a Sun Solaris box after having spent the past five years working with RedHat. From what i can tell, thing look fairly similar and the 'man' command is some help. But I've... (7 Replies)
Discussion started by: deckard
7 Replies
10. Solaris
Hi experts,
I am running a solaris 10 with oracle 10 on a system with 96 GB physical memory. the system has a lot of swap space. the oracle SGA is 50 GB and PGA 40 GB. Here are the stats
vmstat -i
interrupt total rate
--------------------------------
clock ... (5 Replies)
Discussion started by: afadaghi
5 Replies
LEARN ABOUT LINUX
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)