03-03-2018
I was told by the sysadmin it is not the firewall.
8 More Discussions You Might Find Interesting
1. HP-UX
Dears,
I installed HP-UX Server, when I tried to reach it through Xterm it returns the error like
Xrcmd
Cannot establish a connection to "Server IP" on port 22
Anyone here to tell me the reason(s)
find attached xterm.jpg (3 Replies)
Discussion started by: smartyshan
3 Replies
2. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
3. Shell Programming and Scripting
Hi All,
I want to establish a ODBC connection to a database from linux and query the tables of a database.
Please let me know how I can achieve this.
Thanks and Regards
Nagaraja Akkivalli. (0 Replies)
Discussion started by: Nagaraja Akkiva
0 Replies
4. Red Hat
How do make connection between two linux server.Such as SSH,rsync,ftp (3 Replies)
Discussion started by: Mani T
3 Replies
5. Red Hat
Tryied both ways curl and wget
wget --no-check-certificate https://mysitet.it:61617
--2017-05-05 17:29:02-- https://mysitet.it:61617/
Connecting to myproxy:8080... connected.
Proxy tunneling failed: ForbiddenUnable to establish SSL connection.
curl https://mysite.it:61617
curl: (56)... (3 Replies)
Discussion started by: charli1
3 Replies
6. BSD
Hello guys!
I am setting up a script to access a unix remote server. My problem is that when I put the ssh line "my host", the script does not wait for the server response asking for the password to execute the line in which I put the password, that is, I need to put a form in which script has a... (1 Reply)
Discussion started by: aroucasp
1 Replies
7. UNIX for Beginners Questions & Answers
Hi,
I want to validate ssh connection one after one for multiple servers..... password less keys already setup but now i want to validate if ssh is working fine or not...
I have .sh script like below and i have servers.txt contains all the list of servers
#/bin/bash
for host in $(cat... (3 Replies)
Discussion started by: sreeram4
3 Replies
8. AIX
Hello Team,
I would need your help to enable communication over TLS1.2 on AIX 7.1 or 7.2 with IBM JDK 1.8 latest update.
By default, the request is trying to establish a connection over TLSv1 even though TLS 1.2 is explicitly enabled on server as well as on Java 8. The openssl command throws... (4 Replies)
Discussion started by: Naina2019
4 Replies
LUSER(8) System Manager's Manual LUSER(8)
NAME
luser - process to control the clueless individuals who (mis)use computer systems, peripheral devices and system administrators. Word play
on "loser" and "user".
SYNOPSIS
luser [-d] [-g<level>] [-s] <lusername>
DESCRIPTION
luser is the primary tool a system administrator uses to manage end-user requests. This powerful tool can actually cause the specified user
to perform actions as specified by the flags.
With no flags, luser deletes every running process owned by the specified <lusername>.
OPTIONS
-d Disk reclamation mode. Remove all files in the home directory of <lusername>.
-g<level>
Grovel mode. Causes the specified luser to make an act of contrition to the sysadmin for past sins. The <level> indicates the sever-
ity of the contrition:
LEVEL
0 User makes a sincere apology and promises to never do it again.
1 User buys sysadmin a large quantity of sysadmin's favorite beverage.
2 User signs over ownership of his/her car to sysadmin.
3 User resigns from the company after writing a long letter of apology detailing his/her failings.
4 User commits ritual suicide by sucking on a power strip and grounding himself to a conduit.
NOTES
Sysadmins are encouraged to use the -s option as a way to smarten up the world's user base. Use the -g option at level 4 outside the con-
fines of the machine room. The more lusers that witness the act, the better.
SEE ALSO
sysadmin(1)
BUGS
Occasionally, the luser may survive the effects of luser -g4. In that event, a second invocation of the command will usually prove to be
fatal.
HISTORY
Written by Eric L. Pederson <eric@bofh.org.uk>.
25 September 1995 LUSER(8)