09-01-2008
URGENT :- Linux remote access... issue
Hi !
I have a linux machine( stand lone) in my office network.
now, I have application on that machine ( web based)
I'm not able to access that box.. using
http://abc:4435/console
I'm able to ping that box.. and also connect via "ssh"
Pls.... help.. Its a production issue...
Any help is highly apperciated.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I need to access files from a specific folder of a Linux system from an another Linux System Remotely.
I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility.
Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies
2. Shell Programming and Scripting
Hi
I have users A and B in UNIX system both are not having root priveleges.
User A has written a script file where it connects to database and uses a logfile directed to the path in directory of USER B.
I copied the script into USER B directory and tried to run the script.
Its giving... (3 Replies)
Discussion started by: skyineyes
3 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I Installed Tomcat in an remote linux server (/usr/tomcat)and start service, using ./startup.sh (and tried with ./catalina.sh too).
//----------------------------------------------------------------//
# ./startup.sh
Using CATALINA_BASE: /usr/tomcat/apache-tomcat-6.0.16/
Using... (1 Reply)
Discussion started by: gothama
1 Replies
4. Linux
Dear Friends,
I have Red Hat Enterprise Linux 5.0 Server installed in HP Blade server which is dont have monitor. I want access my Linux server on my windows XP Pro with full graphic through the network. Please help me how to do it. I have root password.
Thanks.
:b: (10 Replies)
Discussion started by: pramodpatil
10 Replies
5. Shell Programming and Scripting
Hello,
I've bought an semi-dedicated (cloud computing) server, but yesterday I had to change my IP, so I tried this with PuTTY:
Went to
/etc/network/interfaces
And changed
iface eth0 inet static
To
iface eth0 inet dhcp
Hoping to get an dynamic IP
Then I restarted my... (5 Replies)
Discussion started by: lukinhasb
5 Replies
6. Shell Programming and Scripting
Hi Experts,
I need a script in which I need to scp a file /home/chandan/abc.txt to a remote server using scp. Then I need to check whether scp is successful or not.
How am I going to write this code?
My Server Name: myserver
File Name On My Server: /home/chandan/abc.txt
Destination Server... (1 Reply)
Discussion started by: ChandanN
1 Replies
7. Homework & Coursework Questions
Dear Friends,
This is not a problem , it's a course work (UNIX scenario)....
As part of it I am searching Remote Attacks and find points as
1. Exploiting a listening service
2. Routing through Unix system that is providing security between 2 or more networks
3. User initiated Remote execution... (1 Reply)
Discussion started by: anespa
1 Replies
8. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT LINUX
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)