If you cannot install sudo, the target user can allow you access by making an entry in a .rhosts file containing a single line with two parameters:
See man .rhosts .
Make sure that any .rhosts file has permissions 600 and is owned by root (or less preferably owned by the user).
Some sites do not allow .rhosts files because they are deemed to be a security risk. This is mainly because it's easy to create one which would allow anybody access to an account.
Hi everyone,
I have a very simple question to ask :
How can I locate the files created the last "n" days?
(the find command has 3 options : -atime, -ctime, -mtime, but none of these returns the newlly created files ... am I wrong?)
Thank you. (3 Replies)
Hi,
I am using the following command.
nawk '$1==p{$2=sprintf("%09d",$2+1)};1' p=$JOB_NUM q=$LEN $VALUE_TABLE > ./TEMP_TABLE
As you can see the code above, I basically read a value from the table VALUE_TABLE and select a particular row based on searching the value JOB_NUM. Now Actually the... (2 Replies)
I am reading a Sunsolve document covering moving /var and am confused by one step. What does this command do (in English):
Move into the existing /var directory and transfer all the data to /newvar
# cd /var
# tar cvf - . | (cd /newvar; tar xfBp -) (4 Replies)
Hi ,
I need your help to know the exact operation of this following code ..
cat file1 | ux2dos | tr -d ''>>file2
file1 contains only one line : "DTS-PO\SPECTRUM WO 56"
the data contains a META CHAR "\" .. look at the above line.
But , The file2 output contains :... (7 Replies)
:confused:
Hi All,
i am new to unix....so i am not sure whether i am asking the related question with our forum..
My question .....Can anyone explain me about the CGI script
is it something related to Unix or Linux or some other language.
Thanks in advance
Sha (1 Reply)
Hi All,
can you please help me to get clarified about the 'write' command.
I have a script that sends a content of a file msg.txt to other user 'User B' using 'write' command.
Script:
------
.....
cat msg.txt | write "user B"
.....
Issue: I face a issue here, this scripts sends... (3 Replies)
I know the topic of getting yesterday's date has been covered ad nauseum, but I just want to be clear on something.
I recently started using the command
date --date='1 days ago' '+%m/%d/%y'
to get yesterday's date and it's been working great. I just want to be certain that it is going to... (1 Reply)
Hi,
I am checking below command to see the status of windows service from unix but due to "!" sign it is not accepting password. Please suggest alternative what should i do resolve the issue.
net rpc service status W32Time -I 10.1.1.1 -U "mydomain\admin%Passwod12!"
One more thing... (1 Reply)
Hi,
I'm a newbie to shell programming and have just written a small program to transfer files.
# job variables
RunMode=$1
export DATETIME=`date +%Y%m%d%H%M%S`
export STARTTIME=`date +%Y%m%d%H%M`
export ShellDir=/rosetlt/scripts/ksh
export LogDir=/rosetlt/scripts/log
export... (2 Replies)
Discussion started by: narayanv
2 Replies
LEARN ABOUT ULTRIX
rhosts
rhosts(5) File Formats Manual rhosts(5)Name
rhosts - list of hosts that are logically equivalent to the local host
Syntax
/$HOME/.rhosts
Description
The file allows a user who has an account on the local host to log in from a remote host without supplying a password. It also allows
remote copies to the local host.
If the file exists, it is located in a user's home directory. It is not a mandatory file, however.
The format of a file entry is:
hostname [username]
The hostname is the name of the remote host from which the user wants to log into the local host. The username is the user's login name on
the remote host. If you do not specify a user name, the user must have the same login name on both the remote and local hosts.
The host names listed in the file may optionally contain the local BIND domain name. For more information on BIND, see the Guide to the
BIND/Hesiod Service.
If a user is logged in to and wants to log in to a host called without supplying a password, she must:
o Have an account on
o Create a file in her home directory on
o Specify host1 ginger as an entry in the file.
If has the same login on both and she can simply specify host1 in her entry. You can allow the superuser of a remote system to log in
to your system without password protection or perform a remote copy by having a file in the root ( / ) directory, but it is not recom-
mended.
In addition to having a file, the superuser needs a terminal entry in the file for each pseudoterminal configured in the system. The
secure entry looks similar to the following:
ttyp3 none network secure
See the reference page for more information.
Examples
The following is a sample file for the user It is located in her home directory on She also has accounts on the hosts called and Her login
name on and is the same as on but her login on is
To enable to log in to from and without supplying a password, her on should contain the following entries:
machine1
system1 gordon
host3
See Alsohosts.equiv(5), ttys(5)
Introduction to Networking and Distributed System Services
rhosts(5)