04-17-2010
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
After Configuring a brand new netraT1, It appears, the only way you can log in as root is throught the Serial Port (console). I believe there is a file in /etc which can be edited to allow root to access login via other methods
eg: telnet, ssh, etc.
My Question:
Which file contains... (2 Replies)
Discussion started by: SmartJuniorUnix
2 Replies
2. UNIX for Dummies Questions & Answers
Hello again !
Thanks for response of my first question. there is my second quesiton why i have local.profile instead of .profile file ?
my all files in pwd shoes local. before any file.
is anybody can tell me about that ?
Thanks
Abid Malik (5 Replies)
Discussion started by: abidmalik
5 Replies
3. Solaris
Hi all,
On Solaris 8.2 I have several printers controled via LPD so they are defined with systemnames. The problem is I can't disable them as I could in Unix V with the disable command.
Is there a way to do this however?
Thank in advance! :)
Peter (2 Replies)
Discussion started by: nulnul7
2 Replies
4. Solaris
During the Solaris 10 installation, I answered "Yes" at the "Activate Remote Access" screen - or something like that. I know this is a security issue and I want it disabled now. How can I disable remote access ?
Thanks. (4 Replies)
Discussion started by: chinezu'
4 Replies
5. AIX
If user login and don't do anything in 15 mins, the user is kicked off from the server. how to disable it? (5 Replies)
Discussion started by: rainbow_bean
5 Replies
6. UNIX for Advanced & Expert Users
Besides doing some shell-script which loops through /etc/passwd, I was wondering if there was some command that would tell me, like an enhanced version of getent.
The Operating system is Solaris 10 (recent-ish revision) using Sun DS for LDAP. (5 Replies)
Discussion started by: ckmehta
5 Replies
7. Solaris
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
8. UNIX for Dummies Questions & Answers
I have already disabled root login over the ssh by modifying /etc/ssh/sshd_config.
But how would i disable root login on a server itself.
We have implemented LDAP in our environment and our security guide states that root login must be obtained by first logging into the host using his/her own... (2 Replies)
Discussion started by: pinga123
2 Replies
9. Shell Programming and Scripting
Hello All,
I'm new to unix and i need the below favour from you.
I have list of 50 unix server. I need to login to all the server one by one and with the same user and password. I will declare the user name and password globally in the script.
for example :
servername- hyperV
user name... (4 Replies)
Discussion started by: Hari A
4 Replies
10. Solaris
Hi all,
how can I disable direct login to a Solaris system not only for root user but also for other accounts?
Looking in google I came to the following:
For telnet (/etc/default/login):
disable root access> CONSOLE=/dev/console
disable generic user> ?
For ssh... (5 Replies)
Discussion started by: Evan
5 Replies
LEARN ABOUT ULTRIX
rhosts
rhosts(5) File Formats Manual rhosts(5)
Name
rhosts - list of hosts that are logically equivalent to the local host
Syntax
/$HOME/.rhosts
Description
The file allows a user who has an account on the local host to log in from a remote host without supplying a password. It also allows
remote copies to the local host.
If the file exists, it is located in a user's home directory. It is not a mandatory file, however.
The format of a file entry is:
hostname [username]
The hostname is the name of the remote host from which the user wants to log into the local host. The username is the user's login name on
the remote host. If you do not specify a user name, the user must have the same login name on both the remote and local hosts.
The host names listed in the file may optionally contain the local BIND domain name. For more information on BIND, see the Guide to the
BIND/Hesiod Service.
If a user is logged in to and wants to log in to a host called without supplying a password, she must:
o Have an account on
o Create a file in her home directory on
o Specify host1 ginger as an entry in the file.
If has the same login on both and she can simply specify host1 in her entry. You can allow the superuser of a remote system to log in
to your system without password protection or perform a remote copy by having a file in the root ( / ) directory, but it is not recom-
mended.
In addition to having a file, the superuser needs a terminal entry in the file for each pseudoterminal configured in the system. The
secure entry looks similar to the following:
ttyp3 none network secure
See the reference page for more information.
Examples
The following is a sample file for the user It is located in her home directory on She also has accounts on the hosts called and Her login
name on and is the same as on but her login on is
To enable to log in to from and without supplying a password, her on should contain the following entries:
machine1
system1 gordon
host3
See Also
hosts.equiv(5), ttys(5)
Introduction to Networking and Distributed System Services
rhosts(5)