11-05-2015
This User Gave Thanks to Scrutinizer For This Post:
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello people,
In shell scripts if some sensitive data is set into the env so that it is available to other scripts called within those scripts -- Are there are security implications ?
-- I believe the scope of those environment variables ends with the execution of the script.
-- I see that... (4 Replies)
Discussion started by: tipsy
4 Replies
2. UNIX for Advanced & Expert Users
All,
I'm hoping someone can help fill me in on this one.
:confused:
I work with bank data deemed "sensitive" and, once processed, need to figure out a way to overwrite the files with enough garbage data in order to prevent someone from being able to recover any of the data from the disk. I... (5 Replies)
Discussion started by: peteroc
5 Replies
3. Post Here to Contact Site Administrators and Moderators
I have posted some data on the forum which needs to be deletd ASAP.
The post here in question are
How to do in this in shell script?
How to modify this script?
How to resolve this error?
Error in code in linux?
Please remove all the parts from post :
i-d4411185 ... (6 Replies)
Discussion started by: Palak Sharma
6 Replies
4. Post Here to Contact Site Administrators and Moderators
Hello,
Can you please delete or modify a post that contains sensitive data. I can't post full links, here's the end of the link: shell-programming-and-scripting/94965-help-shell-scripting-modify-user-creation-script-oracle-database.html
It's got a lot of data that should never be posted on... (2 Replies)
Discussion started by: JonHeller
2 Replies
5. Post Here to Contact Site Administrators and Moderators
Hi Sir ,
Please remove the following code from the post
https://www.unix.com/unix-for-advanced-and-expert-users/210081-ftp-issue.html
thanks
Prabhu (7 Replies)
Discussion started by: ptappeta
7 Replies
6. Post Here to Contact Site Administrators and Moderators
Hi Sir,
please remove following terms from post as it is sensitive data
https://www.unix.com/shell-programming-and-scripting/235655-print-single-line.html
ifeeds
fidedev
ironsides
feedmgr
thanks a lot
prabhu (1 Reply)
Discussion started by: ptappeta
1 Replies
7. Post Here to Contact Site Administrators and Moderators
Hi
Kindly remove the following from the post . These are confidential info posted by mistake
https://www.unix.com/shell-programming-and-scripting/201037-perl-while-loop-each.html
please remove the comments section which is first 16 lines in the perl script .
Also please remove the ... (1 Reply)
Discussion started by: ptappeta
1 Replies
8. Post Here to Contact Site Administrators and Moderators
In this thread: /shell-programming-and-scripting/255687-organizing-text-file-capital-names-capital-word-capital-word.html (sorry i cant use links)
that is not an example, those are real students names with real student login id's for the college i am attending and i am on that list. Please... (3 Replies)
Discussion started by: throwawayacc
3 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)