10-22-2012
Quote:
Originally Posted by
rdrtx1
I'm using Linux machine.. This command is not found.....
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I don't have root access. How do I find i.p address of our sun server? Thanks. (4 Replies)
Discussion started by: vpotluri
4 Replies
2. UNIX for Advanced & Expert Users
Hi, I am wondering how I can find the network address under following situation.
Things available:
1. An active network drop without knowing any details about the network.
2. I have windows, Linux, and Solaris machine available to use.
Things to achieve:
1. Find out the... (5 Replies)
Discussion started by: jiashi2
5 Replies
3. HP-UX
I'm trying to find the IP address of a print queue. I tried this, but nada.
cat /etc/hosts | lp -d lp01
Looked in the hosts file but it's not there (2 Replies)
Discussion started by: abNORMal
2 Replies
4. IP Networking
I connect to my client's network via VPN. We have a UNIX box there & I would like to know IP address of my PC when I connect to UNIX box using Putty software. I checked this command - /usr/sbin/ifconfig -a and it showed me the output
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232... (4 Replies)
Discussion started by: gppande
4 Replies
5. UNIX for Advanced & Expert Users
Could anyone help me to identify the IP address of a printer queue with its printer queue name information . (1 Reply)
Discussion started by: lenin1985
1 Replies
6. AIX
How to find the router IP address (2 Replies)
Discussion started by: AIXlearner
2 Replies
7. UNIX for Dummies Questions & Answers
Hello,
I got a list of IP address from which I would like to remove the duplicates. I cat the file and pipe it to uniq -u or uniq -c, I got the same output with all the duplicates. Can anybody please tell me how I can remove the duplicates IPs from this file? This is what I used.
cat filename |... (3 Replies)
Discussion started by: Pouchie1
3 Replies
8. Red Hat
Hi all,
I am new to this forum and this is my first question :). Using Red hat Linux.I tried to find file which stores IP address based on different helps given in this forum but did not get success. Here is the system details:
-bash-3.2$ lsb_release -a
LSB Version: ... (2 Replies)
Discussion started by: Barkha
2 Replies
9. IP Networking
I'm trying to remotely probe a range of IP addresses. First I need a list of IP addresses for a very small geographic area. I've had a lot of trouble obtaining them. I would like to find a database or something.
Suppose I do get the data. Can I see if that IP address is in use by someone? Can I... (2 Replies)
Discussion started by: rockandAir
2 Replies
10. Shell Programming and Scripting
Hi,
I am trying to write a script that will check all used IP on the server and then print me an addressees that are not in use. Problem is in comparing two variables
#!/bin/bash
NETSTAT=$(netstat -ntp | awk '{ print $4 }' | grep -v "127.0.0.1" | cut -d ":" -f1 | grep "^"|sort | uniq )... (6 Replies)
Discussion started by: nemesis911
6 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)