07-20-2008
Answers
1) if you want ot copy file from machine1 to machine 2 and if they are connected then you should use ftp to connect to machine1 to machine2 and fetch the file. Hope this is the answer if wrong please correct.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi I have just a few questions about the Unix aka NIX operating system.
1. Is it a free Operating System and if so where can I obtain it.
2. Where can I start out for a newbies guide to the OS.
Thanks (1 Reply)
Discussion started by: SolidWing68
1 Replies
2. UNIX for Dummies Questions & Answers
1. Someone pings a server from another location and gets a different result than if you ping the same server onsite. What is going on?
2. You know the reason the server won't boot is because of ODS, but the root partition isn't on ODS. How do you go about fixing it?
3. How would you truncate... (1 Reply)
Discussion started by: JoeTheMan
1 Replies
3. UNIX for Dummies Questions & Answers
Hi All,
Im trying to send a .ZIP file in an email message using mail or mailx. What is the easiest way to do this?
Thanks!
UPDATE: I used the following command which didnt work
mailx -s {my subject} {xxxxx@ssss.com} < /var/tmp/file.zip (3 Replies)
Discussion started by: lewisoco
3 Replies
4. UNIX for Dummies Questions & Answers
1) Can a script be made to ignore all signals.
2) Does the parent process always picks up the exit status of its children.
3) Can one program give rise to multiple processes.
4) Is a file is synonymous with a process.
5) Is the kill command only used to kill a running process. (1 Reply)
Discussion started by: yahoo14
1 Replies
5. What is on Your Mind?
Hello all.
Im a young lad with very limited experience with computers, even though I have been playing with them the past 5 years. I have the experience of the random World of Warcraft player that plays games all day.
I have a huge interest in learning everything about computers and I was... (5 Replies)
Discussion started by: Vallzi
5 Replies
6. UNIX for Dummies Questions & Answers
If I wanted to do the following things to all the files in a directory how could I do it. Make all the files in a directory and in its sub directories to hidden status and make a different directory and all its sub directories copy inhibit. I am really stumped and have been looking through the... (8 Replies)
Discussion started by: kaka
8 Replies
7. SCO
Dear friends
I'm really new comer to this place and to this subject
you will make me so happy if you help me about these questions:
1- I must install UNIX 5.0.6 because one of my work software will works ONLY on this version , so , I want to know WHERE CAN I DOWNLOAD A COMPELETE PACKAGE OF... (2 Replies)
Discussion started by: mrr53
2 Replies
8. Shell Programming and Scripting
Hello,
Hello,
Can any one tell me the answer of these questions attached in the document.
The competition was over and I wanted to know correct answers. (6 Replies)
Discussion started by: bits1904
6 Replies
9. Homework & Coursework Questions
I need help for the following questions:
1. What are the advantages and disadvantages of using ACLs versus ordinary Unix file permissions?
2. Describe three methods for automating system administration tasks. Discuss the time taken to do things manually versus creating automatic systems.... (3 Replies)
Discussion started by: ravian97
3 Replies
LEARN ABOUT ULTRIX
rhosts
rhosts(5) File Formats Manual rhosts(5)
Name
rhosts - list of hosts that are logically equivalent to the local host
Syntax
/$HOME/.rhosts
Description
The file allows a user who has an account on the local host to log in from a remote host without supplying a password. It also allows
remote copies to the local host.
If the file exists, it is located in a user's home directory. It is not a mandatory file, however.
The format of a file entry is:
hostname [username]
The hostname is the name of the remote host from which the user wants to log into the local host. The username is the user's login name on
the remote host. If you do not specify a user name, the user must have the same login name on both the remote and local hosts.
The host names listed in the file may optionally contain the local BIND domain name. For more information on BIND, see the Guide to the
BIND/Hesiod Service.
If a user is logged in to and wants to log in to a host called without supplying a password, she must:
o Have an account on
o Create a file in her home directory on
o Specify host1 ginger as an entry in the file.
If has the same login on both and she can simply specify host1 in her entry. You can allow the superuser of a remote system to log in
to your system without password protection or perform a remote copy by having a file in the root ( / ) directory, but it is not recom-
mended.
In addition to having a file, the superuser needs a terminal entry in the file for each pseudoterminal configured in the system. The
secure entry looks similar to the following:
ttyp3 none network secure
See the reference page for more information.
Examples
The following is a sample file for the user It is located in her home directory on She also has accounts on the hosts called and Her login
name on and is the same as on but her login on is
To enable to log in to from and without supplying a password, her on should contain the following entries:
machine1
system1 gordon
host3
See Also
hosts.equiv(5), ttys(5)
Introduction to Networking and Distributed System Services
rhosts(5)