12-28-2013
I am looking for the address for my laptop.
Am I correct in saying that if I find the IP address of my laptop I can simply:
ssh "IP address" and that will connect me?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello,
I am installing redhat linux 6.2 on an intel based system. Whether i want to know any naming conventions should i follow.
ie Any convention to follow to name a linux machine(To give hostname). Simillarly for domain name also. Please suggest in this regard (1 Reply)
Discussion started by: bache_gowda
1 Replies
2. IP Networking
Using Solaris 8 (or WINXP).
I am trying to look up a specific DNS hostname, but I don't know which DNS server houses that entry. How can I find the hostname?
nslookup gives me the following:
C:\>nslookup hostname
Server: dnsserver
Address: x.x.x.x
*** dnsserver can't find hostname:... (2 Replies)
Discussion started by: dangral
2 Replies
3. Solaris
In solaris 9, how do I setup hostname alias, so essentially the machine has two hostnames... (3 Replies)
Discussion started by: csaunders
3 Replies
4. UNIX for Dummies Questions & Answers
Hello to all,
Does anyone have a clue for the following problem?
When I enter into a terminal console window logged as axadmin user, what I find in the prompt is: “axadmin@sunhost$”.
But, when I switch to root user, with the command “su -“ and enter the correct password, user root is... (4 Replies)
Discussion started by: Pablo_BR
4 Replies
5. UNIX for Dummies Questions & Answers
Hello,
I am new to Solaris.
I am using stand alone Solaris 10.0 for test/study purpose and connecting to internet via an ADSL modem which has DHCP server. My Solaris is working on VMWare within winXP. My WinXP and Solaris connects to internet by the same ADSL modem via its DHCP at the same... (1 Reply)
Discussion started by: XNOR
1 Replies
6. Solaris
Hi All,
My current setup is:
1x Windows Server (Windows 2000 server)
1x Unix Server
2x Windows machine
3x Unix Terminals (Hostnames = A, B and C)
Problem
The problem iam having is Unix terminal C cannot be ping across by Unix terminal A or B or Unix server by using the hostname. Unix... (1 Reply)
Discussion started by: tlee
1 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I am using hostname environment variable in my shell script to print the host name but it's printing nothing.Can you please help me on this.
Please find the part of the code pasted here:
llist=
llist=$(ps -ef | grep -v grep | grep -c "$1")
echo "Hostname is ${hostname}" (7 Replies)
Discussion started by: gbiswal
7 Replies
8. Emergency UNIX and Linux Support
Hi All,
So we added a new HP-UX 11.31 machine. Copied OS via Ignite-UX (DVD)over from this machine called machine_a. It was supposed to be named machine_c. And it is when you log in...however when I'm in the ILO console before logging in, it says:
It should say:
What gives? And how do... (4 Replies)
Discussion started by: zixzix01
4 Replies
9. Solaris
Hi,
We have one server originally named <SERVERA>.
Now we plan to put another network card & add another hostname <SERVERB>. Later, we will need to change hostname from <SERVERB> to <SERVERC>.
I know that we need to plumb a new ip & add to /etc/hosts & /etc/hostname.<interface>. Is there... (2 Replies)
Discussion started by: beginningDBA
2 Replies
10. UNIX for Advanced & Expert Users
deleted (0 Replies)
Discussion started by: hce
0 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)