02-07-2009
SSH login via wlan
Hi
Is it totally safe to login via SSH through a wlan that is not encrypted? Is there anything to think about when doing it?
10 More Discussions You Might Find Interesting
1. BSD
Hi!
I just wanted to know what network cards are supported in FreeBSD. I have looked at the list of supported cards but I can't find any of them in the stores. Is the list not updated, I would really preciate info about where (in EU, Sweden) I can buy them.
/Peter (2 Replies)
Discussion started by: Barfly.se
2 Replies
2. UNIX for Dummies Questions & Answers
hi,
i have red hat RHEL-5 on my machine, i ma trying to ssh login on remote machine
root@localhost~]# ssh ip_address(of remote machine)
it works fine if i know the password, i use wireless network so the ip keeps on changing,so is there any way to access the machine with some unique name, which... (1 Reply)
Discussion started by: ankita tux
1 Replies
3. Red Hat
hi,
to ssh login i give the command..
root@localhost~] # ssh ip_add
it allows me to login on a remote machine if i know the password, but i work on wireless network so the ip keeps on changing for the remote machine, how can i access that machine with some unique name , that does not changes.i... (3 Replies)
Discussion started by: ankita tux
3 Replies
4. Shell Programming and Scripting
I would like to login to host and once logged into host would like to run script.
i.e "ssh hostname -l username /opt/share/scripts/vol"
Can someone please have this run as script ..
Many Thanks
-sam (1 Reply)
Discussion started by: sam786
1 Replies
5. IP Networking
Here is the thing.
I've got a TP link router (TL-WR541G) and 3 PCs accessing to Internet through it.
2 Desktop PCs (1 with Debian and 1 WinXP)
1 laptop (with Ubuntu).
In my router (192.168.1.1) I can see the MAC and IP of all machines assigned (DHCP) by the router.
But when I ping to them... (3 Replies)
Discussion started by: funyotros
3 Replies
6. IP Networking
Hi all,
I am trying to get radvd to broadcast router advertisements on a wireless interface (wlan0).
The wireless interface is running an ad-hoc wireless network. However, for some reason, radvd will say that wlan0 not running and refuse to start.
The only way I can get radvd to broadcast... (0 Replies)
Discussion started by: abxccd
0 Replies
7. HP-UX
why I can login by telnet using root account
but when i use login by ssh using root account
it is not successful ,is it different password
i am sure ssh service is started (2 Replies)
Discussion started by: alert0919
2 Replies
8. Shell Programming and Scripting
Hi,
I am trying to login Server2 from server1 in a shell script and need to perfrom few commands,
Below is the command i used to login to server2 from server1
ssh -l username server2
However everytime it executes it asking for password.
How do write a script in such way it takes... (1 Reply)
Discussion started by: ch33ry
1 Replies
9. Red Hat
Dear all,
I have unknowingly deleted openssh-server on one of my linux boxes...
So I could not do ssh in to this machine and also could not scp to it.
Now I need to copy and install openssh-server in this box..
How could I do as both ssh and scp is not working.
Even FTP is also... (1 Reply)
Discussion started by: jegaraman
1 Replies
10. Shell Programming and Scripting
spawn ssh remotehost -l skysmart
when the password is incorrect, this will attempt to log in 2 more times, before it exits.
is there an option I can pass to ssh that'll make it try only once and will then abort immediately if the password is incorrect?
something like:
spawn ssh... (1 Reply)
Discussion started by: SkySmart
1 Replies
LEARN ABOUT DEBIAN
passwd
PASSWD(5) File Formats and Conversions PASSWD(5)
NAME
passwd - the password file
DESCRIPTION
/etc/passwd contains one line for each user account, with seven fields delimited by colons (":"). These fields are:
o login name
o optional encrypted password
o numerical user ID
o numerical group ID
o user name or comment field
o user home directory
o optional user command interpreter
The encrypted password field may be blank, in which case no password is required to authenticate as the specified login name. However, some
applications which read the /etc/passwd file may decide not to permit any access at all if the password field is blank. If the password
field is a lower-case "x", then the encrypted password is actually stored in the shadow(5) file instead; there must be a corresponding line
in the /etc/shadow file, or else the user account is invalid. If the password field is any other string, then it will be treated as an
encrypted password, as specified by crypt(3).
The comment field is used by various system utilities, such as finger(1).
The home directory field provides the name of the initial working directory. The login program uses this information to set the value of
the $HOME environmental variable.
The command interpreter field provides the name of the user's command language interpreter, or the name of the initial program to execute.
The login program uses this information to set the value of the $SHELL environmental variable. If this field is empty, it defaults to the
value /bin/sh.
FILES
/etc/passwd
User account information.
/etc/shadow
optional encrypted password file
/etc/passwd-
Backup file for /etc/passwd.
Note that this file is used by the tools of the shadow toolsuite, but not by all user and password management tools.
SEE ALSO
crypt(3), getent(1), getpwnam(3), login(1), passwd(1), pwck(8), pwconv(8), pwunconv(8), shadow(5), su(1), sulogin(8).
shadow-utils 4.1.5.1 05/25/2012 PASSWD(5)