08-10-2011
You can setup SSH shared keys between the 2 hosts you want to scp.
With shared keys, it won't ask you for a password. Search on google on how to setup password less SSH authentication between 2 hosts.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi could someone tell me where to find a secure copy prog.
for unix and windows
thnx a lot
helios (4 Replies)
Discussion started by: helios
4 Replies
2. UNIX for Dummies Questions & Answers
I am currently getting the following error on a solaris box : Could not open SCM connectionlaris box:
Would someone be able to help me understand the error as I do not know what a SCM connection is.
thanks
Kristian (1 Reply)
Discussion started by: kristian
1 Replies
3. Cybersecurity
I am needing to "un-block" port 3306 so that I can access MySQL from another PC.
When I installed Mandrake 8.1, I set the security level to high because it is going to be a web server. I believe I have to allow access to my ports now and I do not know the commands to do that.
If anyone... (4 Replies)
Discussion started by: gdboling
4 Replies
4. HP-UX
Hello,
We try to do an SCP of a Sybase dump file of 4Go between two production HP-UX servers.
Each time the transfer stopn at 299Mo and we have the message "connection lost".
The destination FS has largefiles option activated.
Could you help ? (7 Replies)
Discussion started by: ohemeg
7 Replies
5. UNIX for Dummies Questions & Answers
Hi,
i want to write a script that executes a program (exec?) .
this program then requires a filename as input.
how do i give it this input in the script so the program will be complete run and close by the script.
e.g.
exec prog.exe
program then asks for filename
"enter filename:"... (1 Reply)
Discussion started by: tuathan
1 Replies
6. UNIX for Dummies Questions & Answers
Hello UNIX users,
Thanks for helping me in my earlier post. Now, I am facing a timeout issue when ever I am transferring a zipped file from my server to client's server.
If the zipped file size is below 3 MB, it goes fine. Anything above that fails.
Below is the part of screenshot from... (1 Reply)
Discussion started by: st3636
1 Replies
7. Shell Programming and Scripting
I'm trying to run MPI programs on 8 machines, but I get the error
connect to address 127.0.0.1 port 544: Connection refused
Trying krb4 rsh...
connect to address 127.0.0.1 port 544: Connection refused
trying normal rsh (/usr/bin/rsh)
lagrid02: Connection refused
When I run it with a... (8 Replies)
Discussion started by: vishwamitra
8 Replies
8. HP-UX
I was wondering if HP offers a loaner program to allow me virtual access to a HP-UX host, similar to IBM's loaner program for their AIX platform. The loaner program is essentially a VPN to IBM's network where you can access a number of AIX machines remotely.
Thanks! (2 Replies)
Discussion started by: vokuro
2 Replies
9. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
10. Shell Programming and Scripting
Hi Team,
I have 2 servers Server-A & Server-B.
Is there any way to test scp connection between Server-A & Server-B without transferring file?
Basically i want to test the availability of scp connection..
Thanks in advance... (6 Replies)
Discussion started by: Girish19
6 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)