07-17-2014
Quote:
Originally Posted by
Corona688
My suggestion would be to ignore the OS,
Yes and no. In pinciple you are right, but the rootvg might contain things you deem equally confidential - ssh keys in home directories, wallet files for databases, and similar things.
The procedure i described - export the VG, then zero out the first GB of each disk device of the VG - will work for datavgs too, of course. I just mentioned the rootvg, because this is usually the most complicated to delete. You have to "take away the floor you stand on", so to say.
Another option would be to over-install a fresh copy of the OS, so that all the old data get surely overwritten. This can easily be done remotely vin NIM (AIX) or kickstart.
I hope this helps.
bakunin
This User Gave Thanks to bakunin For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a .sh script which was running fine on all the UNIX Servers (AIX, SunSolaris). The script requires two mandatory parameters and many optional parameters. Now at a different client place who are on a Windows Server, when I try to execute the script through MKS Toolkit, there are couple of... (5 Replies)
Discussion started by: madhunk
5 Replies
2. Fedora
Hi,
Is it possible to install Linux on an AIX server?
Is there any doc available with anyone for installation? Please help. (1 Reply)
Discussion started by: dwiravi
1 Replies
3. AIX
Hi,
I am a newbie to AIX. We have 2 AIX5.3 servers in our environment, I need to transfer some files in Binary mode from one server to another and some files in ASCII mode from one server to another server. Could you please help me as to how I need to do that?
Thanks,
Rakesh (4 Replies)
Discussion started by: rakeshc.apps
4 Replies
4. AIX
Guy's
AIX Monitoring Tool - under preparing .....
I'm working to make and prepare tool to monitor AIX system and my idea it's based on the following outputs
I want command to give me shout outpous about the following ...
CPU load
Memory load
Used load
Number of... (5 Replies)
Discussion started by: Mr.AIX
5 Replies
5. Red Hat
Hi,
Can anyone help me on migration the print server from AIX to RHEL 4?
Appreciate your help? (1 Reply)
Discussion started by: brby07
1 Replies
6. AIX
Hi,
I am trying to mount a nfs folder from AIX client to Linux NFS Server, but I got the following error:
# mount 128.127.11.121:/aix /to_be_del
mount: 1831-010 server 128.127.11.121 not responding: RPC: 1832-018 Port mapper
failure - RPC: 1832-008 Timed out
mount: retrying... (1 Reply)
Discussion started by: victorcheung
1 Replies
7. HP-UX
Hi,
Please suggest wipe tool for hp-ux. (2 Replies)
Discussion started by: manoj.solaris
2 Replies
8. AIX
Hello everybody,
Please let me know if there are any free C profiling tool for AIX environment
Thanks in advance (0 Replies)
Discussion started by: SteAlma
0 Replies
9. AIX
Hi,
is any one using nagios monitoring solution on AIX ? if yes, is it supported on AIX 7.1 TL 03 as well ?
I tried to search online and unix.com , could not find it.
Thank you (5 Replies)
Discussion started by: aaron8667
5 Replies
10. AIX
Hi folks,
How can i configure an AIX LDAP client to authenticate against an Linux Openldap server over TLS/SSL?
It works like a charm without TLS/SSL.
i would like to have SSL encrypted communication for ldap (secldapclntd) and ldapsearch etc. while accepting every kind of certificate/CA.... (6 Replies)
Discussion started by: paco699
6 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)