Sponsored Content
Special Forums IP Networking helping new Linux users remotely ? Post 302336639 by lagagnon on Wednesday 22nd of July 2009 01:39:29 PM
Old 07-22-2009
helping new Linux users remotely ?

I volunteer with a small charity which locally donates refurbished computers to people who normally could not afford their own computer. Most of these computers now have Linux on them. We are in the process of remastering Xubuntu 9.04 to use as our main distro from now on.

In the past any time a client had a computer problem they telephoned
us and we had to walk them through their problem, or more often than
not, go to their place of residence to help them out, as many of our clients don't even know what panel, task bar, icon, etc. even mean!

It would be fantastic if we could ssh or vpn or whatever into these
machines remotely, at least to check the basic status of the box. However, the vast majority get dynamic IP addresses from their ISP's and some are behind routers also. I'm not really up on networking stuff so any ideas on how this might be accomplished and how to set up our remastered distro with VPN, ssh or whatever, would be greatly appreciated.

cheers...Larry
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Need a helping hand --stuck in starting of this problm.

Hi all it is a real challenge for me to do it in 2 days any help or suggestion will be a great ! Problem : I have 17 - CSV files (Coma separated value) each file conating around 26 column the first line of each of the file conatin the field name and from second line the file contain data for... (13 Replies)
Discussion started by: jambesh
13 Replies

2. Red Hat

Change password of linux servers remotely

Hi, I am very bad at scripting. I need help from scripting experts... I need to change password of around 100 linux remote servers. I have been given a script for changing the password that automates the task. however I do not understand the usage and meaning of the script, the script is an... (0 Replies)
Discussion started by: renuka
0 Replies

3. UNIX for Advanced & Expert Users

How can I remotely take unix/linux tty control!?

Hello everyone!. I am wondering if it is possible to take control of a tty session???!!!. For example: imagine you are running a command in a unix server that will take 12 hours to compleate... now, imagine you are at your home and you want to check how the command is performing or if errors... (2 Replies)
Discussion started by: dragonov7
2 Replies

4. Shell Programming and Scripting

cut operation is not helping me much

hi, i have a file where I want to extract the the failure count only from the file. JOB_NAME STATE RUN_COUNT FAILURE_COUNT ------------------------------ --------------- ---------- ------------- OFS_BALA_BILLING_IN SCHEDULED 22992 ... (6 Replies)
Discussion started by: gotam
6 Replies

5. Shell Programming and Scripting

How to change passwords for User accounts on multiple UNIX/Linux machines remotely?

Hello Experts, Need some direction on creating shell script for following environment: We have about 20 people in the team working as Oracle DBA's (sysdba's and appdba's). Total Servers which is a mix of Unix and Linux are 200. We do not have Root user access on any of the servers and... (3 Replies)
Discussion started by: sha2402
3 Replies

6. Shell Programming and Scripting

Create users remotely

Hello Forum, I just wrote a bash script to create users remotely from a file. When I run the script localy, it work nice. But when I run it using rsh it stops. My script is: #!/bin/bash 1|cat /root/usuarios.txt | while read line; do 2| /usr/sbin/adduser $line 3| echo... (4 Replies)
Discussion started by: cachorroyayo
4 Replies

7. UNIX for Dummies Questions & Answers

Connect to my Linux network remotely?

Have - -3 HP Proliant G4P servers - Debian (wheezy) -3 RaspPI's - Raspian -Unmanaged switch that all 6 can ssh into each other with via eth0 -Router (w wifi and 5 ports) - on eth1 of the three G4p's of protocol dhcp Want: To let the six servers, in my basement run, since the HPs are... (5 Replies)
Discussion started by: sas
5 Replies

8. Shell Programming and Scripting

Helping a Newbie with Shell Homework

Good Evening, i got a homework where i have to list all files in the directory with the name length >=3 and <= 6 and after trying it for 2 days my Prof gave me a bit of code: #!/bin/bash for file in $(ls) do done after that he told me "now you only have to use wc and you got it" but... (1 Reply)
Discussion started by: Mentoss
1 Replies
SSH-KEYSIGN(8)						    BSD System Manager's Manual 					    SSH-KEYSIGN(8)

NAME
ssh-keysign -- ssh helper program for host-based authentication SYNOPSIS
ssh-keysign DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with SSH protocol version 2. ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting EnableSSHKeysign to ``yes''. ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen- tication. FILES
/etc/ssh/ssh_config Controls whether ssh-keysign is enabled. /etc/ssh/ssh_host_dsa_key /etc/ssh/ssh_host_ecdsa_key /etc/ssh/ssh_host_rsa_key These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read- able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host- based authentication is used. /etc/ssh/ssh_host_dsa_key-cert.pub /etc/ssh/ssh_host_ecdsa_key-cert.pub /etc/ssh/ssh_host_rsa_key-cert.pub If these files exist they are assumed to contain public certificate information corresponding with the private keys above. ENVIRONMENT
SSH_USE_STRONG_RNG The reseeding of the OpenSSL random generator is usually done from /dev/urandom. If the SSH_USE_STRONG_RNG environment variable is set to value other than 0 the OpenSSL random generator is reseeded from /dev/random. The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 14 bytes. This setting is not recommended on the computers without the hardware random genera- tor because insufficient entropy causes the connection to be blocked until enough entropy is available. SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8) HISTORY
ssh-keysign first appeared in OpenBSD 3.2. AUTHORS
Markus Friedl <markus@openbsd.org> BSD
July 16, 2013 BSD
All times are GMT -4. The time now is 09:11 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy