09-26-2007
I reckon so but you may have to be cunning with allocating virtual terminals.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I am trying to run the below command in perl but when the perl script is executed it prompts a error message saying " ssh: <username>: Name or service not known ". Not able to understand this as this command runs perfectly on the server prompt.
` ssh <username>@pus4026dev df -k >>... (2 Replies)
Discussion started by: be2sp1
2 Replies
2. Shell Programming and Scripting
Many thanks to anyone who can help me solve this problem I am having:
I am working on an HP-UX system version B.11.11 and I have been tasked with finding a way to read a file on a remote server (cat, grep, etc.) using a specific userID without copying it or moving it to the local machine.
... (0 Replies)
Discussion started by: Korn0474
0 Replies
3. UNIX for Advanced & Expert Users
i'm trying to change passwd remotely in unix (solaris) and tried using "expect" but it is not working.
Any ideas to change the passwd remotely using a shell script? (1 Reply)
Discussion started by: pharos467
1 Replies
4. Red Hat
Hi,
I am very bad at scripting. I need help from scripting experts...
I need to change password of around 100 linux remote servers. I have been given a script for changing the password that automates the task. however I do not understand the usage and meaning of the script, the script is an... (0 Replies)
Discussion started by: renuka
0 Replies
5. AIX
Hi everyone
I have accounts on over 40 servers, and I have to change the password frequently. Is there a utility that I can use from my laptopn that will allow me to do that? Did anyone write a script in putty to do that?
Thanks (5 Replies)
Discussion started by: nimo
5 Replies
6. Shell Programming and Scripting
HI I 'm new shall script and unix. I want to create script for change password root by ssh-keygen command . I have 50 servers and I want ot login ot the servers via ssh by type ones password and can login every machines.The script ssh-keygen must ot generate key every weekly than it send new... (2 Replies)
Discussion started by: pellnapook
2 Replies
7. Shell Programming and Scripting
Hi All,
Hope you all doing well...!!!
First of all i will like to share few information about my network.
I have a network of 50 solaris servers sample IPs are (10.2.135.1 to 10.2.135.50)..
i have created trust for root user of servers 1(10.2.135.1) in all other servers, that is i have shared... (4 Replies)
Discussion started by: varunksharma87
4 Replies
8. Solaris
Hello. I am trying to ssh and run a script from a remote computer. These computers will be both Windows and MACs. I am using Solaris 8 and what I have tried is:
using putty
ssh user@ip_address (remote command) /folder/folder/filename.sh
The issue here is that the user profile has not... (3 Replies)
Discussion started by: jkmtm
3 Replies
9. Solaris
Hi everyone,
I have a Solaris machine:
SunOS 5.10 Generic_127127-11 sun4v sparc SUNW,SPARC-Enterprise-T5220
After reboot, I can't ssh to this machine. Error message:
ssh: connect to host xxxx port 22: Connection refused
It seems ssh daemon is not running, but I don't have... (5 Replies)
Discussion started by: Zaiwen Gong
5 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT X11R4
securetty
SECURETTY(5) Linux Programmer's Manual SECURETTY(5)
NAME
securetty - file which lists terminals from which root can log in
DESCRIPTION
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmis-
sion of certain authentication tokens.
It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the
shadow suite.
On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are
accepted.
FILES
/etc/securetty
SEE ALSO
login(1), login.defs(5), pam_securetty(8)
COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the
latest version of this page, can be found at https://www.kernel.org/doc/man-pages/.
Linux 2015-03-29 SECURETTY(5)