Which just fills all available disk space with zeroes. You might want to follow with
Code:
dd if=/dev/urandom of=dummyfile; rm dummyfile
to overwrite with random data.
Note, if the machine in question is an ssh or https server, you don't want to exhaust the available entropy; consider generating one one machine and piping through ssh onto the other.
Code:
dd if=/dev/urandom | ssh other 'cat >dummyfile; rm dummyfile'
Note also that if this involves the root filesystem or a multi-user system this will cause problems when the disk fills. Think carefully before doing this on critical systems.
Rather new to unix, so please don't beat me!
I'm trying to get a list of files into a variable that I can use throughout the rest of the script. The challenge is that I need to exclude a certain extension from the list, and I'm having trouble with it. For example:
item_a
item_a.exe... (3 Replies)
In my system , there is a script seems have a minor problem but I can't find it out , now everytime run the script , it will generate some error message to the system log , is it possible to forbid it generate the error to the system log or put all these message to /dev/null ? thx (3 Replies)
the file /etc/passwd has corrupted mistakenly.actually the file has saved as "oot:0:0:root:/root/sbin/bash".
first r of root has been deleted ..
can anyone tell me how can i recover as normal user (2 Replies)
Hello World!
I am writing code in C++ which have to launch another application X using exec().
I would like to set some limits on it using setrlimit etc...
My problem is that i don't know how to forbid using fork() and strlimit by application X.
How can i do it? (3 Replies)
Hello friends
I have an CentosOS 5 box running Apache, I want to Install a powerful File Integrity checker with recovery option to maintain any changes may be happened without my hand
Could you help me to recommend such solution
Thanks (3 Replies)
Hi ALL,
I'm encountering this problem on HP Shell (tcsh) environment.
Once I enter in vi to edit a file and add my sql script, like this:
sqlplus user/pass @promo.sql(tu run my script)
the @ character is not possible to write.
I push on the key but is not written inside.
Also in sqlplus... (3 Replies)
is it possible to recovery a deleted file in AIX? (2 Replies)
Discussion started by: fiyas
2 Replies
LEARN ABOUT REDHAT
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)NAME
ssh-keysign -- ssh helper program for hostbased authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during hostbased authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the the global client configuration file /etc/ssh/ssh_config by setting
HostbasedAuthentication to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about hostbased authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if hostbased
authentication is used.
SEE ALSO ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)AUTHORS
Markus Friedl <markus@openbsd.org>
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
BSD May 24, 2002 BSD