05-09-2011
for BASH or KSH you should also add disown after that.
5 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Does anyone know if there is software out there top allow me to take remote control of a remote CDE desktop like using MS netmeeting? I do not mean mimick the window I mean take over/share the same session. Any help is appreciated (1 Reply)
Discussion started by: boat73
1 Replies
2. Solaris
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
3. SuSE
hi guys
I want to exhaust all the possibilities so I'm going to ask this here
I am installing a Suse 11 on IBM Blade Center using Remote Control.
when using this is impossible to use the mouse I see the mouse but I have no control over it I try to move it but no way it moves to fast s no... (3 Replies)
Discussion started by: kopper
3 Replies
4. Solaris
Hi Peeps,
Wondering if anyone can help me, trying to launch the remote console on a T3-2. When I select use serial redirection it comes up with a dialogue box that says. "The remote console application requires java 5.0. Please Download java from http://www.java.com"
"Do you wish to... (1 Reply)
Discussion started by: callmebob
1 Replies
5. AIX
Is there a way that I can remotely control a user's ssh session so I can see what they are doing and walk them through the problem they are having on my AIX based application? (2 Replies)
Discussion started by: De@nneG
2 Replies
LEARN ABOUT DEBIAN
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)