05-19-2015
Can you ssh into your VPS using a password?
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi falks,
I have the following program:
#!/bin/ksh
ed -s /home/ias/v9.0.3/j2ee/OC4J_RiGHTv_HPCD2/applications/Xbip/Xbip/WEB
-INF/config/application.properties <<EOF >/dev/null
1
d
.
d
.
a
application.filePath.core = /core-HPCD2/Html/
application.filePath.xbip =... (2 Replies)
Discussion started by: nir_s
2 Replies
2. Windows & DOS: Issues & Discussions
I tried to run my ksh scripts in SFU and it always says "not found" as in the example below:
$ .file
/bin/ksh: .file: not found
Did I miss something in the SFU Installation? (2 Replies)
Discussion started by: ilak1008
2 Replies
3. Solaris
Hi,
I am currently in the process of testing upgrading from Solaris 8 to Solaris 10.
one problem i have encountered is when i am running any of my batch scripts.
All my scripts start with #! /bin/ksh so that they will excuted in the ksh shell.
but the scripts will not run correctly. The... (3 Replies)
Discussion started by: dshakey
3 Replies
4. Shell Programming and Scripting
I am trying a set up a very simple korn shell script. It has 2 basic steps.
Firstly I read the first line of a text file (which is a file name)
Secondly I run a fortran executable using that line
I must be doing something wring because it wouldn't work. I know that the executable wants the... (4 Replies)
Discussion started by: larangunn
4 Replies
5. UNIX for Advanced & Expert Users
I noticed some strange looking parameters on some processes on one of our servers, and after a little playing around we deduced that ksh seemed to be adding a (somewhat random) extra parameter when calling a script without a hashbang in it.
It looks like it's the partial name of the parent... (10 Replies)
Discussion started by: CarloM
10 Replies
6. UNIX for Dummies Questions & Answers
Long story short, I have everything working in my SOHO which would include Postfix,Dovecot(imap),Roundcube,bind and is ready to recieve email from the outside using this tutorial:
https://workaround.org/ispmail/wheezy
I also setup my internal DNS server using:
https://wiki.debian.org/Bind9... (2 Replies)
Discussion started by: metallica1973
2 Replies
7. Shell Programming and Scripting
Hi Guys,
Just entering the Linux word, So I need help to write a script on my local machine(Ubuntu 14.04) that continuously check the particular folder(contains images) and a json file on the server and download whenever new images are added to that folder and whenever there is a change in the... (10 Replies)
Discussion started by: g4v1n
10 Replies
8. UNIX for Beginners Questions & Answers
Hello,
I'm trying to automate a wget cronjob for Php 5.4 on Wordpress - using Cpannel on a linux server hosted by Godaddy. Below is the command I'm using, which isn't working.
wget -q -O "/wp-cron.php?import_key=&import_id=&action=trigger" >/dev/null 2>&1
========== EDIT
Thank you so... (5 Replies)
Discussion started by: embus
5 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)