Sponsored Content
Full Discussion: Filtering Fake inputs
Top Forums Shell Programming and Scripting Filtering Fake inputs Post 302340934 by TonyFullerMalv on Tuesday 4th of August 2009 05:13:28 PM
Old 08-04-2009
You could either:

1. Try pinging the servername given and only proceed if it succeeds but then other machines on the network could be entered and accepted.

2. Have a text file listing the hosts, one per line, run a:
Code:
cat -n hostfilelist

To present the hosts names with a number in front of each, then ask the user to select a host by entering the number and then do something like:
Code:
read NUMBER
SELECTEDSERVER=`cat -n hostfilelist | grep "^${NUMBER} " | awk '{ print $NF }'`

 

8 More Discussions You Might Find Interesting

1. Linux

Fake System32 Folder

I read somewhere that you can create a fake system32 folder in linux where you can store the most common windows runtime libraries, that way you can install windows programs (using wine) directly in linux, what I meen is that even the installer works. Does anyone know how I can do this, and where... (2 Replies)
Discussion started by: Kimm
2 Replies

2. Solaris

system Fake IPs

hi all ; I am using solaris 8 over SPARC . i was given the role to administer a webmail server running Iplanet 4.2 i was told also that this server is running a website . this server has 2 fake IPs . My question is how i can know these fake IPs and how they are mapped . cheers (2 Replies)
Discussion started by: ppass
2 Replies

3. Shell Programming and Scripting

Fake deletion of files

Hi, This is possibly an odd request to do with permissions as I seem to have tied myself up with these! I have the following directory (see below) that contains files that the 'usergrp' user needs to be able to 'delete' files from. drwxr-s--- 2 usergrp usergrp 512 16 Feb 14:37... (2 Replies)
Discussion started by: Peejay
2 Replies

4. UNIX for Advanced & Expert Users

port mapping with fake ip

Hi there, i have a question to all. The task is: Redirect port from local host to remote (datapipe etc.) with faking my ip. For example, nmap with -S option make fake ip of host it being running. pic: -> 10.1.1.1:80 ... (1 Reply)
Discussion started by: lecter
1 Replies

5. UNIX for Dummies Questions & Answers

fake network address....

Good morning! Why would having a fake network device be useful? Thanks in advance Bigben (0 Replies)
Discussion started by: bigben1220
0 Replies

6. IP Networking

What is a fake network device?

Thanks in advance! Ben (1 Reply)
Discussion started by: bigben1220
1 Replies

7. UNIX for Dummies Questions & Answers

fake email sender

Hi, I am using the below command to send the email. mailx -s "test from `hostname`" email@gmail.com < attachment.txt id uid=870(wlsuser) gid=641(wlsgrp) I recieve the email as "From: wlsuser@hostname Can I somehow have any string instead of wlsuser, if that grows too complex to... (4 Replies)
Discussion started by: shifahim
4 Replies

8. Cybersecurity

Fake MicroSoft calls

Dear colleagues, it's that time of the year again: in recent days and weeks I'm receiving annoying numbers of annoying "support" calls from dubious "MicroSoft Centers" telling me that my computer generates errors and / or downloads malicious SW. Although ignoring these pesterers on the phone,... (8 Replies)
Discussion started by: RudiC
8 Replies
RSH(1C) 																   RSH(1C)

NAME
rsh - remote shell SYNOPSIS
rsh host [ -l username ] [ -n ] command host [ -l username ] [ -n ] command DESCRIPTION
Rsh connects to the specified host, and executes the specified command. Rsh copies its standard input to the remote command, the standard output of the remote command to its standard output, and the standard error of the remote command to its standard error. Interrupt, quit and terminate signals are propagated to the remote command; rsh normally terminates when the remote command does. The remote username used is the same as your local username, unless you specify a different remote name with the -l option. This remote name must be equivalent (in the sense of rlogin(1C)) to the originating account; no provision is made for specifying a password with a com- mand. If you omit command, then instead of executing a single command, you will be logged in on the remote host using rlogin(1C). Shell metacharacters which are not quoted are interpreted on local machine, while quoted metacharacters are interpreted on the remote machine. Thus the command rsh otherhost cat remotefile >> localfile appends the remote file remotefile to the localfile localfile, while rsh otherhost cat remotefile ">>" otherremotefile appends remotefile to otherremotefile. Host names are given in the file /etc/hosts. Each host has one standard name (the first name given in the file), which is rather long and unambiguous, and optionally one or more nicknames. The host names for local machines are also commands in the directory /usr/hosts; if you put this directory in your search path then the rsh can be omitted. FILES
/etc/hosts /usr/hosts/* SEE ALSO
rlogin(1C) BUGS
If you are using csh(1) and put a rsh(1C) in the background without redirecting its input away from the terminal, it will block even if no reads are posted by the remote command. If no input is desired you should redirect the input of rsh to /dev/null using the -n option. You cannot run an interactive command (like rogue(6) or vi(1)); use rlogin(1C). Stop signals stop the local rsh process only; this is arguably wrong, but currently hard to fix for reasons too complicated to explain here. 4.2 Berkeley Distribution April 29, 1985 RSH(1C)
All times are GMT -4. The time now is 11:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy