04-22-2014
You will have to connect the app to detect the actions of the server, this will help in detecting the activity done.
Wordpress website builder
Last edited by markjoseph; 04-24-2014 at 09:20 AM..
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello when I examined the partition information of one of our servers I saw the following:
10.20.5.2:/ha0/critical
Fstab has a similar entry. Seems that the server is accessing a partition on a remote machine.
What else is required to setup a partition that accesses a remote machine... (2 Replies)
Discussion started by: mojoman
2 Replies
2. Shell Programming and Scripting
Hi,
I need to copy few files from remote server to local server.
I write a shell script to connect to the remote server using ftp and go to that path. Now i need to copy those files in the remote directory to my local server with the timestamp of all those files shouldnt be changed.
... (5 Replies)
Discussion started by: arunkumarmc
5 Replies
3. Red Hat
Hi Gurus,
I have been working on encrypting a partition in a Fedora box and have successfully encrypted a partition(By name /test) using "cryptsetup & luks".
The below command was put up in a runcontrol file which is called during bootup to automount them during bootup.
cat... (0 Replies)
Discussion started by: Hari_Ganesh
0 Replies
4. Programming
Hi,
I have 1. lappy
2. server A
3. server B
Now, what i need is to run a command from lappy that will sftp a file from server A to server B.
Please guide me to achieve this.
-akash (1 Reply)
Discussion started by: akash.mahakode
1 Replies
5. Solaris
Hi,
I am trying to automate the process of fetching files from remote server to local server through sftp. I have the username and password for the remote solaris server. But I need to give password manually everytime i run the script.
Can anyone help me in automating the script such that it... (3 Replies)
Discussion started by: ssk250
3 Replies
6. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
7. Shell Programming and Scripting
Hi guys,
So i am in server1 and i have to login to server 2, 3,4 and run some script there(logging script) and output its result. What i am doing is running the script in server2 and outputting it to a file in server 2 and then Scp'ing the file to server1. Similarly i am doing this for other... (5 Replies)
Discussion started by: srkmish
5 Replies
8. Shell Programming and Scripting
Hello Every one!!
I am trying to write a shell script which will connect to a remote server and execute scripts which are at a certain path in the remote server.
Before this I am using a sudo command to change the user.
The place where I am stuck is, I am able to connect to the... (6 Replies)
Discussion started by: masubram
6 Replies
9. Shell Programming and Scripting
I have a script, which connecting to remote server and first checks, if the files are there by timestamp. If not I want the script exit without error. Below is a code
TARFILE=${NAME}.tar
TARGZFILE=${NAME}.tar.gz
ssh ${DESTSERVNAME} 'cd /export/home/iciprod/download/let/monthly;... (3 Replies)
Discussion started by: digioleg54
3 Replies
LEARN ABOUT CENTOS
amcryptsimple
AMCRYPTSIMPLE(8) System Administration Commands AMCRYPTSIMPLE(8)
NAME
amcryptsimple - reference simple crypt program for Amanda symmetric data encryption
SYNOPSIS
amcryptsimple to be called by Amanda only
DESCRIPTION
amcryptsimple calls gpg to perform symmetric data encryption on Amanda backup. amcryptsimple will search for the gpg program in the
following directories: /usr/local/bin:/usr/bin:/usr/sbin:/bin:/sbin
amcryptsimple uses one passphrase to encrypt the Amanda data and uses the same passphrase to decrypt the Amanda backup data. amcryptsimple
uses AES256 as the symmetric cipher.
HOW TO CREATE PASSPHRASE
Store the passphrase inside the home-directory of the Amanda user ($amanda_user) and protect it with proper permissions:
echo my_secret_passphrase > ~$amanda_user/.am_passphrase
chown $amanda_user:disk ~$amanda_user/.am_passphrase
chmod 700 ~$amanda_user/.am_passphrase
NOTES
Choose a good passphrase and protect it properly. Backup data can only be restored with the passphrase. There is no backdoor.
If storing and securing passphrase in your environment presents challenges, Amanda provide public-key data encryption through amgpgcrypt.
Public-key encryption uses the public key to encrypt and uses the private key to decrypt.
SEE ALSO
amanda(8), amanda.conf(5), amcrypt(8), amgpgcrypt(8), amrestore(8), gpg(1)
The Amanda Wiki: : http://wiki.zmanda.com/
AUTHOR
Kevin Till <kevin.till@zmanda.com>
Zmanda, Inc. (http://www.zmanda.com)
Amanda 3.3.3 01/10/2013 AMCRYPTSIMPLE(8)