04-04-2012
We have a recent topic with
poll about this. Please use the search function.
10 More Discussions You Might Find Interesting
1. Cybersecurity
Eh... yeah. What the title says. :D (1 Reply)
Discussion started by: PSC
1 Replies
2. UNIX for Dummies Questions & Answers
How can I use ssh client with proxy support?
If possible: with proxy chain support. :) (2 Replies)
Discussion started by: zylwyz
2 Replies
3. UNIX for Dummies Questions & Answers
Hi ,
I am a newbie to unix,linux i have a fedora core 4 linux. I had set it up as a pptp vpn client to a windows pptp server. Everything was working fine. Recently i saw that there were many attempts to hack into the root login using ssh. so i changed the ssh port,the ssh portocol to 2. And... (0 Replies)
Discussion started by: qais
0 Replies
4. HP-UX
As user root and with some users I can use ssh to connect to remote hosts. But with a specific user I can't use ssh client because:
$ ssh
OpenSSL version mismatch. Built against 90807f, you have 90703f
Is it a $PATH problem or what?
HP-UX version is 11.11. (2 Replies)
Discussion started by: untamed
2 Replies
5. Red Hat
Alright, I'm not really sure how to say this, since my professor didn't really understand what I was saying, but we have a project in my operating systems class, and what we have to do is create a linux IPC, so I'm using the msgget(), msgsnd(), msgrcv() functions. Now, I run a Windows machine, so... (0 Replies)
Discussion started by: blind melon
0 Replies
6. Red Hat
Is there any Better FREE SSH client similar to Secure CRT ?
We are working on cluster db servers. PROD/DEV/UAT/QA/TEST server hostnames are just one letter differences. it always confuse me to which one I am logging in.
So I am looking for a free SSH client, for windows where I can store... (4 Replies)
Discussion started by: johnveslin
4 Replies
7. UNIX for Dummies Questions & Answers
I have identical scripts on two machines: one a laptop running Ubuntu 9.04, and the other a Windows XP desktop running Cygwin. The files I'd like to process are on the Windows machine. Running the script in Cygwin engages eight calls to an external executable and spins off who knows how many forks... (1 Reply)
Discussion started by: SilversleevesX
1 Replies
8. AIX
I am a new user and i wish to connect to a unix(AIX) server from a windows client using ssh.A detailed solution would be highly appreciated. (1 Reply)
Discussion started by: ajayb3004
1 Replies
9. Shell Programming and Scripting
I have
tools -> options -> terminal -> buffer -> 999999
but when I scroll up, I often lose what I scroll up to. This always happens when I am connected to oracle in sqlplus. This has never happened to me with poderosa in Sun Solaris or Linux and I have never had to set any variables or... (1 Reply)
Discussion started by: guessingo
1 Replies
10. Solaris
Hi Gurus,
I need an SSH client to connect to a Solaris server from windows and run a few scripts.
I am able to put/pull files using "psftp" using below command:
psftp -l <username> -pw <password> <hostname> -b <batchfile>
However i am unable to find an equivalent for ssh.
I tried... (3 Replies)
Discussion started by: Hari_Ganesh
3 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)