07-29-2013
Using SSH is fairly easy. You just have to have IP connectivity between the boxes. To check if that is the case, you should get IP address from the target machine (for example by executing ifconfig -a or ip a on it), then using ping <TARGET_IP>. If the command will show packets being received, then you can move to running: ssh <USERNAME>@<TARGET_IP>.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
can i do this? i am learning this on my own..and from the book..simple unix i am not sure if the syntax would work
if
statement
then
statement
do or for or while
statement
done
else
statement
fi....
I dont know how else to explain that...I hope I... (2 Replies)
Discussion started by: jonas27
2 Replies
2. Shell Programming and Scripting
#!/bin/sh
APP_ROOT_MODE1=/opt/app1.0
APP_ROOT_MODE2=/opt/app2.0
APP_ROOT=${APP_ROOT_${APP_MODE}}
# enviornment variable APP_MODE will be exported in the terminal where
# we run the applciation, its value is string - MODE1 or MODE2
# My intension is:
# when export APP_MODE=MODE1... (4 Replies)
Discussion started by: princelinux
4 Replies
3. UNIX for Dummies Questions & Answers
im trying to figure out how to do the following:
using pipes to combine grep and find commands to print all lines in files that start with the letter f in the current directory that contain the word "test" for example?
again using pipes to combine grep and find command, how can I print all... (1 Reply)
Discussion started by: ez45
1 Replies
4. Programming
Can anyone recommend a very good Fortran online course for unix. It should also cover Fortran X11 programming if possible. I understand this learning cannot be rushed but a course that addresses useful topics sooner is best. If it isn't free, that's okay. (1 Reply)
Discussion started by: gav2251
1 Replies
5. Solaris
Is possible to learn Solaris 10 from guides for Solaris 9 (3 Replies)
Discussion started by: microbot
3 Replies
6. Shell Programming and Scripting
Folks! Anyone please explain the behavior of this program step by step. Thanks.
#! /usr/bin/perl
$testfile = "./testfile2";
for ( $i = 1, $i <= 5, $i++) {
open ($FILE, ">", $testfile);
print ($FILE "Output 1 \n");
close ($FILE);
}
print "The value of (4 * 2) / 2 is ";
print (4 * 2)... (1 Reply)
Discussion started by: huko99
1 Replies
7. UNIX for Dummies Questions & Answers
Hi,
Can you give me some good document or link to learn more about "vi" editor. I'm interested to master its short-cut keys and tricks in the VI editor, please help, thank you. (1 Reply)
Discussion started by: Dev_Dev
1 Replies
8. Web Development
I have tried to create a web page browser window. An example, I copied what the book pretty much wanted but get only the header. What should I change? Also Anyone know any good books for this? Many thanks.
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Translation/EN"
... (4 Replies)
Discussion started by: N-Training
4 Replies
9. AIX
I have a new job where they will expect me to start (as a beginner) to administer using AIX, this will be for a credit card payment company.
I understand that there are many flavours of Unix of which AIX is just one.
Should I concentrate on just trying to learn AIX or is there some other... (9 Replies)
Discussion started by: henfold
9 Replies
LEARN ABOUT SUSE
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key, /etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
May 31, 2007 BSD