Sponsored Content
Top Forums UNIX for Dummies Questions & Answers edit /etc/hosts to show mypc in who Post 30940 by yls177 on Tuesday 29th of October 2002 08:29:46 PM
Old 10-29-2002
1 )mypc is actual host or remote box?
>> actual host is the server which we telnet to? if yes, then mypc is a remote box. mypc is a pc which i am working from my desk to telnet to the actual host say myhost.

so from mypc, i type telnet myhost, then issue a who -uH, and saw the below

123.45.12.55 otherpc BUT

i have edit the /etc/hosts to

123.45.12.55 mypc

so i should see 123.45.12.55 mypc when i issue a who -uH instead of otherpc


2) oops, forget to inform u guys the os version, so after uname -a, i get the below

AIX myhost 3 4 <think this entry is the serial no>



TO livinfree

My guess is that he's either at a different PC, or uses DHCP - if your IP address changes, /etc/hosts doesn't know that...

1) i guess u are right that u said "he's at a different PC" on the assumption that i am doing a telnet to the host (so this is called remote?)

2) now, i dont have a single idea on this DHCP. there is no entry when i do a man DHCP so basically i dont understand the statement "your ip adderss changes, /etc/hosts doesnt know that"
yls177
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

/etc/hosts

hello dear all , i use both sun solaries 7 and linux red hat 6.1 and i added my pc IP address in /etc/hosts . How do i refresh this file in order to make my new ip active ?? without restart . Thanks all (2 Replies)
Discussion started by: tamemi
2 Replies

2. UNIX for Dummies Questions & Answers

hosts.allow & hosts.deny

Hi! Im trying to use host.allow & host.deny to resrtic access to my sun machine, but it doesnt seem to work... I want to allow full access from certain IPīs (ssh,http,ftp,etc...) but deny all kind of conections from outsideworld, the way that im doing that is: hosts.allow ALL:127.0.0.1... (2 Replies)
Discussion started by: Sorrento
2 Replies

3. IP Networking

etc/hosts or something else??

I was wondering where in UNIX is file where I can delete hosts that can or ca not access UNIX machine thanks in advance (5 Replies)
Discussion started by: amon
5 Replies

4. UNIX for Dummies Questions & Answers

Hosts.allow and hosts.deny

Hello everyone, This is my first posts and I did search for a questions but did not find a question that answered my question unless of course I overlooked it. I'm running Solaris 8. I use ssh for the users but I have a user called "chatterbox" that uses telnet but I need for chatterbox to... (1 Reply)
Discussion started by: huddlestonsnk
1 Replies

5. Shell Programming and Scripting

Need help: Script to edit the hosts, network and eth0 file

Hello all :) I am new to scripting. I need somebody to help me write a script that can edit the files. For eg: if i say ./script <ipadd> <hostname> then it should change the ipaddress and hostname in the following files: 1. /etc/hosts 2. /etc/sysconfig/network 3.... (1 Reply)
Discussion started by: Shaikjaveed
1 Replies

6. UNIX for Dummies Questions & Answers

/etc/hosts

Hello, where can I get complete specification for /etc/hosts? I found a lot of snippets but nothing where the format of file is completely written (I'm especially interested in comments in /etc/hosts) Thank you for help! (3 Replies)
Discussion started by: MartyIX
3 Replies

7. UNIX for Dummies Questions & Answers

/etc/hosts

Ive change /etc/hosts many times but it reverts to the previous setting automatically. Ive restarted the server after the edit. Any ideas what im doing wrong Previous /etc/hosts 127.0.0.1 localhost.localdomain localhost # Auto-generated hostname. Please do not remove this... (3 Replies)
Discussion started by: wizecho
3 Replies

8. AIX

aix tcp wrappers hosts.allow hosts.deny?

hi all just installed the netsec.options.tcpwrapper from expansion pack, which used to be a rpm, for my aix 6.1 test box. it is so unpredictable. i set up the hosts.deny as suggested for all and allow the sshd for specific ip addresses/hostnames. the tcpdchk says the hosts allowed and... (0 Replies)
Discussion started by: wf201626
0 Replies

9. Shell Programming and Scripting

Plus edit and edit header

Dear Masters, i have a problem with unix script, till now i just know about how to create header. i want to change file below -63395.2 72653.5 -63361.3 72696.0 ... (9 Replies)
Discussion started by: ipatah
9 Replies

10. Solaris

How to copy a tar file on a series of remote hosts and untar it on those hosts?

Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh. Actions to perform within a single ssh session via shell script - copy a file - untar at destination (remote host) OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
XRemoveHosts()															    XRemoveHosts()

Name
  XRemoveHosts - remove multiple hosts from the access control list.

Synopsis
  XRemoveHosts(display, hosts, num_hosts)
	Display *display;
	XHostAddress *hosts;
	int num_hosts;

Arguments
  display   Specifies a connection to an X server; returned from XOpenDisplay().

  hosts     Specifies the list of hosts that are to be removed.

  num_hosts Specifies the number of hosts that are to be removed.

Description
  XRemoveHosts()  removes  each  specified host from the access control list of the connected server.  The server must be on the same host as
  the process that call XRemoveHosts(), in order to change the access control list.

  If you remove your machine from the access control list, you can no longer connect to that server, and there is no way back from this  call
  except to log out, edit the access control file, and reset the server.

  The address data must be a valid address for the type of network in which the server operates, as specified in the family member.

  For  TCP/IP,	the address should be in network byte order.  For the DECnet family, the server performs no automatic swapping on the address
  bytes.  A Phase IV address is two bytes long.  The first byte contains the least significant eight bits of the  node	number.   The  second
  byte contains the most significant two bits of the node number in the least significant two bits of the byte, and the area in the most sig-
  nificant six bits of the byte.

  For more information on access control lists, see Volume One, Chapter 15, Other Programming Techniques.

Structures
     typedef struct {
	 int family;	    /* for example Family Internet */
	 int length;	    /* length of address, in bytes */
	 char *address;     /* pointer to where to find the bytes */
     } XHostAddress;

     /* constants used for family member of XHostAddress */
     #define FamilyInternet	 0
     #define FamilyDECnet	 1
     #define FamilyChaos	 2

Errors
  BadAccess
  BadValue

See Also
  XAddHost(), XAddHosts(), XDisableAccessControl(), XEnableAccessControl(), XListHosts(), XRemoveHost(), XSetAccessControl().

Xlib - Host Access														    XRemoveHosts()
All times are GMT -4. The time now is 04:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy