07-17-2014
Quote:
Originally Posted by
shyam2j
'dd' was in my mind, but concern was wiping the OS completely and shutting down server after it.
In AIX you do not need to wipe the OS completely. If you overwrite the first GB (or thereabouts) of the rootvgs hdisk device(s) with hexadecimal zeroes you will destroy the VGDA and upon reboot the VG will not be recognizable any more by the OS. This will prevent data recovery with "normal" measures offered by the OS, but it will perhaps not prevent specialized laboratories doing some "extreme" data recovery.
You will have to decide if you want to prevent only "normal" people from getting anything or if you need to even fool the NSA (which probably had your data even before you from tapping the wires ;-)) ).
I hope this helps.
bakunin
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a .sh script which was running fine on all the UNIX Servers (AIX, SunSolaris). The script requires two mandatory parameters and many optional parameters. Now at a different client place who are on a Windows Server, when I try to execute the script through MKS Toolkit, there are couple of... (5 Replies)
Discussion started by: madhunk
5 Replies
2. Fedora
Hi,
Is it possible to install Linux on an AIX server?
Is there any doc available with anyone for installation? Please help. (1 Reply)
Discussion started by: dwiravi
1 Replies
3. AIX
Hi,
I am a newbie to AIX. We have 2 AIX5.3 servers in our environment, I need to transfer some files in Binary mode from one server to another and some files in ASCII mode from one server to another server. Could you please help me as to how I need to do that?
Thanks,
Rakesh (4 Replies)
Discussion started by: rakeshc.apps
4 Replies
4. AIX
Guy's
AIX Monitoring Tool - under preparing .....
I'm working to make and prepare tool to monitor AIX system and my idea it's based on the following outputs
I want command to give me shout outpous about the following ...
CPU load
Memory load
Used load
Number of... (5 Replies)
Discussion started by: Mr.AIX
5 Replies
5. Red Hat
Hi,
Can anyone help me on migration the print server from AIX to RHEL 4?
Appreciate your help? (1 Reply)
Discussion started by: brby07
1 Replies
6. AIX
Hi,
I am trying to mount a nfs folder from AIX client to Linux NFS Server, but I got the following error:
# mount 128.127.11.121:/aix /to_be_del
mount: 1831-010 server 128.127.11.121 not responding: RPC: 1832-018 Port mapper
failure - RPC: 1832-008 Timed out
mount: retrying... (1 Reply)
Discussion started by: victorcheung
1 Replies
7. HP-UX
Hi,
Please suggest wipe tool for hp-ux. (2 Replies)
Discussion started by: manoj.solaris
2 Replies
8. AIX
Hello everybody,
Please let me know if there are any free C profiling tool for AIX environment
Thanks in advance (0 Replies)
Discussion started by: SteAlma
0 Replies
9. AIX
Hi,
is any one using nagios monitoring solution on AIX ? if yes, is it supported on AIX 7.1 TL 03 as well ?
I tried to search online and unix.com , could not find it.
Thank you (5 Replies)
Discussion started by: aaron8667
5 Replies
10. AIX
Hi folks,
How can i configure an AIX LDAP client to authenticate against an Linux Openldap server over TLS/SSL?
It works like a charm without TLS/SSL.
i would like to have SSL encrypted communication for ldap (secldapclntd) and ldapsearch etc. while accepting every kind of certificate/CA.... (6 Replies)
Discussion started by: paco699
6 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)