06-09-2010
Need help... Differences in Communication commands
What is the difference between the following commands. Please with example?
rsh
ssh
scp
rcp
rlogin
ftp
telnet
Cheers..
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
This isn't really a unix question, or even a programming question, but I hope you guys can help. I want to create a program to control the electricity on a model railway.
I have created the program to that it sends characters over the serial cable, but now I need to do the switch that will... (1 Reply)
Discussion started by: KrazyGuyPaul
1 Replies
2. Solaris
Hi,
Can anyone suggest a Unix command or c-shell algorithm to simulate to behavior of "wall" command minus the "all users"? What I'm trying to do is to send a notice to just one particular user but i dont want other remotely-logged-on users to receive the message (on the pseudo-terminals). I... (3 Replies)
Discussion started by: Deanne
3 Replies
3. HP-UX
HI ALL,
I have been trying to install a particular software using remote linux server.
some thing like this:
rsh <host ID> /usr/sbin/swinstall -x autoreboot=true -s /tmp/<software> <Product name>.
The problem is whenever I try to install the product through a shell script the installation... (1 Reply)
Discussion started by: barun agarwal
1 Replies
4. AIX
hello
i'v two aix servers 4.3. last night the goes down becuse electrical f
problems.
when the servers comes up i've notice that file /unix is gone. i've fix it and the problem fixed.
after few hours the same crash becuse elctrical problems.
file /unix is there , but now i've a... (0 Replies)
Discussion started by: ariec
0 Replies
5. Cybersecurity
Hey GUys,
Once again I run in to problem and I am here for ur help.
I have two sun(solaris) box on company LAN.
One Unix Box is behind the firewall and the other one is Outside the firewall. The thing i need to do is
remote display a graphic on Unix box outside the firewall to the Unixbox... (5 Replies)
Discussion started by: ajnabi
5 Replies
6. UNIX for Dummies Questions & Answers
Hiya Everybody just joined,
Not sure if this is the right section:o
I require abit of an assistance with IPC!
I know there are different types of IPC porcesses like signals, semaphores, mutexes, shared memory, message queues, pipes and sockets.
Now say a system has a number of... (4 Replies)
Discussion started by: G.I.Joe
4 Replies
7. Shell Programming and Scripting
Hi
Hope you are having a great weeknd !! I had a question and need your expertise for this :
I have 2 files File1 & File2(of same structure) which I need to compare on some columns. I need to find the values which are there in File2 but not in File 1 and put the Differences in another file... (5 Replies)
Discussion started by: newbie_8398
5 Replies
8. Shell Programming and Scripting
I have a korn shell script that executes a function which is stored in a common library. In the function there is obviously some code. Here is the line of code in the function in question:
temp=`echo $status_cnt|tr -d `
When the shell script executes with set -x, I'm seeing that on most... (2 Replies)
Discussion started by: mjf
2 Replies
LEARN ABOUT DEBIAN
k5login
.K5LOGIN(5) File Formats Manual .K5LOGIN(5)
NAME
.k5login - Kerberos V5 acl file for host access.
DESCRIPTION
The .k5login file, which resides in a user's home directory, contains a list of the Kerberos principals. Anyone with valid tickets for a
principal in the file is allowed host access with the UID of the user in whose home directory the file resides. One common use is to place
a .k5login file in root's home directory, thereby granting system administrators remote root access to the host via Kerberos.
EXAMPLES
Suppose the user "alice" had a .k5login file in her home directory containing the following line:
bob@FUBAR.ORG
This would allow "bob" to use any of the Kerberos network applications, such as telnet(1), rlogin(1), rsh(1), and rcp(1), to access alice's
account, using bob's Kerberos tickets.
Let us further suppose that "alice" is a system administrator. Alice and the other system administrators would have their principals in
root's .k5login file on each host:
alice@BLEEP.COM
joeadmin/root@BLEEP.COM
This would allow either system administrator to log in to these hosts using their Kerberos tickets instead of having to type the root pass-
word. Note that because "bob" retains the Kerberos tickets for his own principal, "bob@FUBAR.ORG", he would not have any of the privileges
that require alice's tickets, such as root access to any of the site's hosts, or the ability to change alice's password.
SEE ALSO
telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)
.K5LOGIN(5)