Sponsored Content
Full Discussion: Hackers!!!!!
Special Forums UNIX Desktop Questions & Answers Hackers!!!!! Post 25753 by norsk hedensk on Monday 5th of August 2002 12:29:42 AM
Old 08-05-2002
one of the most effective measures to take is to just close all ports and turn off all serivices you dont need! and do not use telnet or ftp, passwords sent in plain text. use ssh for remote shell access and remote ftp access.
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Paranoid about hackers

Hi all I noted something strange on my server. The get mesages on my terminal even when I am not logged on. What does this mean? I don;t remember the excact message but it looked like messages from my /var/log/messages. "Can't locate mod probe!" or something like that. I am trying to get the... (4 Replies)
Discussion started by: skotapal
4 Replies

2. UNIX for Advanced & Expert Users

any hackers? i need someones help

to get into an telephone account online :confused: (4 Replies)
Discussion started by: jackie8
4 Replies

3. Cybersecurity

on how to protect your website against hackers

Hi! Looking for some feed back on this tutorial... Thank you for checking out this thread. I'm working on some killer videos right now that will explain in detail how you can protect your website against hackers. The first part of the video series is live right now and it covers Cross-Site... (2 Replies)
Discussion started by: Arne1983
2 Replies
SSH-COPY-ID(1)						      General Commands Manual						    SSH-COPY-ID(1)

NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho- rized_keys file. If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your ssh-agent. Otherwise, if this: ssh-add -L provides any output, it uses that in preference to the identity file. If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin- gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory, if necessary.) NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu- ally, e.g. via chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys on the remote machine. SEE ALSO
ssh(1), ssh-agent(1), sshd(8) OpenSSH 14 November 1999 SSH-COPY-ID(1)
All times are GMT -4. The time now is 02:30 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy