Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Please help my computer has been compromised Post 302895159 by sea on Friday 28th of March 2014 06:14:03 PM
Old 03-28-2014
Have a look at
Code:
cat ~/.ssh/authorized_keys

Wrote on Windows, use tab completion for proper filename.
Unless you added an entry there, it should be empty.
If it isnt, empty it.

If he had set up your machine so you can remotly access it, create a new keyfile.
We'll help on this if required.
 

9 More Discussions You Might Find Interesting

1. IP Networking

in.telnetd[5115] -- compromised?

/* Linux Slackware */ looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful.. Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies

2. Programming

getting computer name

Hi all! Is there any function to get the name from a computer by the IP adresse? Thank you in advance! Greetings Mario (2 Replies)
Discussion started by: coredump2003
2 Replies

3. Shell Programming and Scripting

Another customisation for my computer

Hey, this time, I want my rhythmbox to play a different playlist at a set time (about sleeping time). my shellcode works, since if i run it it works, but when i make crontab run it, nothing happens. I try appending commands to the code, such as cp a file, and that occurs, so I have no idea what is... (1 Reply)
Discussion started by: davidY
1 Replies

4. OS X (Apple)

Change Computer Name

I am trying to change my computer name (located in system prefs-> sharing) using unix i've tried Macbook-Pro:~ user$ hostname Macbook-Pro.local Macbook-Pro:~ user$ sudo hostname hello Password: Macbook-Pro:~ user$ hostname hello It seems to work, but my computer is still called... (2 Replies)
Discussion started by: CBarraford
2 Replies

5. UNIX for Dummies Questions & Answers

How Can I To Power Off My Computer?

I have a SCO UNIX 5.0.6. and a computer ATX. My Question is: How can i to power off my computer without to push the power button? :confused: Please help me. :( Thanks :) (11 Replies)
Discussion started by: vhabalos
11 Replies

6. UNIX for Advanced & Expert Users

who - PC Computer name

Does anyone know of a way of identifying the PC / client name rather than IP address via who or some other AIX command (5.3). (4 Replies)
Discussion started by: gefa
4 Replies

7. What is on Your Mind?

What was your first computer?

Hey, the What Do You Do for a Living thread got me thinking about this. My first "computer" was a Timex Sinclair that I built from a kit. I also spent many hours painstakingly programming a Commodore Vic20 to display graphics and sound (and save them on that slooooow tape drive). My first "real"... (26 Replies)
Discussion started by: dday
26 Replies

8. Windows & DOS: Issues & Discussions

Which Computer to buy?

I currently own a macbook which I am happy with. I will be starting CS coursework in august, is it ok to buy a netbook just for programming purposes. The largest file would be the compiler; I do not see the actual programs taking up that much space. Thanks. (4 Replies)
Discussion started by: N-Training
4 Replies

9. Cybersecurity

Server has been compromised

Hi, I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script. Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Discussion started by: franx47
14 Replies
SSH-COPY-ID(1)						    BSD General Commands Manual 					    SSH-COPY-ID(1)

NAME
ssh-copy-id -- copy public keys to a remote host SYNOPSIS
ssh-copy-id [-lv] [-i keyfile] [-o option] [-p port] [user@]hostname DESCRIPTION
The ssh-copy-id utility copies public keys to a remote host's ~/.ssh/authorized_keys file (creating the file and directory, if required). The following options are available: -i file Copy the public key contained in file. This option can be specified multiple times and can be combined with the -l option. If a private key is specified and a public key is found then the public key will be used. -l Copy the keys currently held by ssh-agent(1). This is the default if the -i option was not specified. -o ssh-option Pass this option directly to ssh(1). This option can be specified multiple times. -p port Connect to the specified port on the remote host instead of the default. -v Pass -v to ssh(1). The remaining arguments are a list of remote hosts to connect to, each one optionally qualified by a user name. EXIT STATUS
The ssh-copy-id utility exits 0 on success, and >0 if an error occurs. EXAMPLES
To send a specific key to multiple hosts: $ ssh-copy-id -i /path/to/keyfile.pub user@host1 user@host2 user@host3 HISTORY
The ssh-copy-id utility was written by Eitan Adler <eadler@FreeBSD.org> as a drop-in replacement for an existing utility included with OpenSSH. BSD
February 28, 2014 BSD
All times are GMT -4. The time now is 06:18 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy