07-11-2001
The first step in blocking remote logins is also one of the first steps everyone should do after bringing up a new server:
(1) Edit the /etc/inetd.conf file and comment out all services you will not immediately need;
(2) Examples (for me) include all the r* commands, finger, etc.
This is critical for security and is just a good practice. Don't leave these services running unless you actively use them.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi
i have recently switched to unix environment,i am trying to make a shell script
which logs on to the remote machines and plays some commands and collects the out put into a file.but i am not able to create any file on remote hosts.see
the sample code .
rsh hostname -l username << ENDTAG... (4 Replies)
Discussion started by: Raom
4 Replies
2. UNIX for Dummies Questions & Answers
Hi Everyone,
Well I am not sure if this right forum. I have install Redhat 5 enterprise. I have everything running. I have configured vncserver. Starts with out errors. I am trying to connect for a XP machine to my RedHat server. I can connect from my XP machine through VNC viewer but I get... (1 Reply)
Discussion started by: Peterh
1 Replies
3. Shell Programming and Scripting
hi all ,
i need the command for remote login in to another terminal, came accross by using "tty" command. please suggest and help me out in this.
Regrds
Sridhar. (1 Reply)
Discussion started by: Sridhar_dev
1 Replies
4. AIX
dear all,
i have a problem, when i try to login to CDE on AIX remotely using xmanager i get a dead screen.
any solution
thanks (1 Reply)
Discussion started by: bondoq
1 Replies
5. Linux
Hi,
How to find remote Linux box login account without login in to that box?
I don't have login account at my remote Linux box. But I need who are all having login account. How do I findout?
Thanks,
--Muthu. (3 Replies)
Discussion started by: Muthuselvan
3 Replies
6. Programming
Hi,
i have written a program that provides the remote login for the system whose IP is specified.
the program is working correctly on the same machine but its not working when i try to communicate with the other system.
i am attaching both client and server programs.
Please help.
... (1 Reply)
Discussion started by: MrUser
1 Replies
7. Solaris
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
8. Shell Programming and Scripting
I m trying to run a batch script in remote desktop which executes unix commands on the unix server...the problem is i wnt the output in HTML format.so in my batch script i m giving the cmd like
ssh hostname path ksh HC_Report.ksh>out.html
...but it generates the HTML file in
remote desktop .i... (2 Replies)
Discussion started by: navsan
2 Replies
9. Shell Programming and Scripting
Hi All
I need to transfer a file from a UNIX server to a windows server.
I saw that it is possible to do this using scp command by looking at the forum listed below:
... (2 Replies)
Discussion started by: vx04
2 Replies
10. Programming
Hello Good Day / Guten Tag....
I have to login the server and the user profile contains some scripts which need the inputs to be taken from the keyboard.
So I use the method to conn.authenticateWithKeyboardInteractive(username, new InteractiveCallback() {
public String... (1 Reply)
Discussion started by: Sanalkumaran
1 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)