Sponsored Content
Full Discussion: Remote Login (Unix)
Top Forums UNIX for Dummies Questions & Answers Remote Login (Unix) Post 3905 by DPAI on Friday 13th of July 2001 09:51:25 AM
Old 07-13-2001
I have one doubt though
In TCP_Wrappers it uses the /etc/hosts.allow and hosts.deny files for logging in. Can the hosts specified be m/cs other than UNIX .

Last edited by DPAI; 07-15-2001 at 12:31 PM..
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

remote login

Hi i have recently switched to unix environment,i am trying to make a shell script which logs on to the remote machines and plays some commands and collects the out put into a file.but i am not able to create any file on remote hosts.see the sample code . rsh hostname -l username << ENDTAG... (4 Replies)
Discussion started by: Raom
4 Replies

2. UNIX for Dummies Questions & Answers

Remote login with VNC

Hi Everyone, Well I am not sure if this right forum. I have install Redhat 5 enterprise. I have everything running. I have configured vncserver. Starts with out errors. I am trying to connect for a XP machine to my RedHat server. I can connect from my XP machine through VNC viewer but I get... (1 Reply)
Discussion started by: Peterh
1 Replies

3. Shell Programming and Scripting

Remote Login in to another Terminal

hi all , i need the command for remote login in to another terminal, came accross by using "tty" command. please suggest and help me out in this. Regrds Sridhar. (1 Reply)
Discussion started by: Sridhar_dev
1 Replies

4. AIX

remote login problem

dear all, i have a problem, when i try to login to CDE on AIX remotely using xmanager i get a dead screen. any solution thanks (1 Reply)
Discussion started by: bondoq
1 Replies

5. Linux

How to find remote Linux box login account without login in to that box?

Hi, How to find remote Linux box login account without login in to that box? I don't have login account at my remote Linux box. But I need who are all having login account. How do I findout? Thanks, --Muthu. (3 Replies)
Discussion started by: Muthuselvan
3 Replies

6. Programming

Sockets for remote login

Hi, i have written a program that provides the remote login for the system whose IP is specified. the program is working correctly on the same machine but its not working when i try to communicate with the other system. i am attaching both client and server programs. Please help. ... (1 Reply)
Discussion started by: MrUser
1 Replies

7. Solaris

how to login with ssh to remote system with out applying the remote root/usr password

how to login with ssh to remote system with out applying the remote root/user password with rlogin we can ujse .rhosts file but with ssh howits possible plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies

8. Shell Programming and Scripting

Triggering remote UNIX shell script from Remote desktop

I m trying to run a batch script in remote desktop which executes unix commands on the unix server...the problem is i wnt the output in HTML format.so in my batch script i m giving the cmd like ssh hostname path ksh HC_Report.ksh>out.html ...but it generates the HTML file in remote desktop .i... (2 Replies)
Discussion started by: navsan
2 Replies

9. Shell Programming and Scripting

Do I require remote login access to a windows server to transfer files from a UNIX server

Hi All I need to transfer a file from a UNIX server to a windows server. I saw that it is possible to do this using scp command by looking at the forum listed below: ... (2 Replies)
Discussion started by: vx04
2 Replies

10. Programming

Remote login UNIX box from java passing parameters to the custom script called in the profile

Hello Good Day / Guten Tag.... I have to login the server and the user profile contains some scripts which need the inputs to be taken from the keyboard. So I use the method to conn.authenticateWithKeyboardInteractive(username, new InteractiveCallback() { public String... (1 Reply)
Discussion started by: Sanalkumaran
1 Replies
mkxauth(1x)							Linux User's Manual						       mkxauth(1x)

NAME
mkxauth - create and merge .Xauthority files SYNOPSIS(1) mkxauth [ -q ] [ -u login ] -c [ host [ host ... ] ] (2) mkxauth [ -q ] [ -u login ] -m login(3) mkxauth [ -q ] [ -u login ] -f host(4) mkxauth [ -q ] [ -u login ] -r host [ -l login ] (5) mkxauth [ -q ] [ -u login ] -z host [ -l login ] DESCRIPTION
mkxauth aids in the creation and maintenance of X authentication databases (.Xauthority files). Use it to create a ~/.Xauthority file or merge keys from another local or remote .Xauthority file. Remote .Xauthority files can be retrieved via FTP (using ncftp(1)) or via rsh(1). For a slight measure of security, mkxauth does not create any temporary files containing authentication keys (although anyone spy- ing on network packets can see the authentication key data as they pass through the network; for secure network communications, use ssh(1)). Creating and Adding to a .Xauthority File To create a .Xauthority file, use mkxauth -c (see(1) above). mkxauth creates a .Xauthority file in the user's home directory (~/), con- taining a `key' or `magic cookie' for the host it was run on (the one returned by hostname(1)). If a .Xauthority file already exists, the keys are added to it. If keys for that host already exist, they are replaced. To create or add to a .Xauthority file for another user, use mkxauth -u login -c. mkxauth adds keys to ~login/.Xauthority (only the root user is allowed to do this). To add a key for more than one host, specify all hosts on the command line: mkxauth -c daffy porky bugs. All hosts specified on the same command line receive the same key. To create different keys for multiple hosts, run mkxauth for each host in succession: mkxauth -c daffy mkxauth -c porky mkxauth -c bugs Merging Keys from Local .Xauthority Files To merge keys from another local user's .Xauthority file, use mkxauth -m login (see(2) above). mkxauth adds the keys in ~login/.Xauthor- ity to ~/.Xauthority, replacing any keys which already exist. ~login/.Xauthority must be readable by the user running mkxauth (normally only the root user can read other people's .Xauthority files). Merging Keys via FTP To merge keys from a remote .Xauthority file via FTP, use mkxauth -f host (see(3) above). mkxauth retrieves the remote .Xauthority from host using ncftp(1) and adds those keys to ~/.Xauthority, replacing any keys which already exist. [NOTE: you must have a ~/.netrc file set up to automatically log you into host, otherwise the FTP login attempt will fail.] Merging Keys via rsh(1) To merge keys from remote .Xauthority file via rsh(1), use mkxauth -r host (see(4) above). mkxauth retrieves the remote .Xauthority from host using rsh(1) and adds those keys to ~/.Xauthority, replacing any keys which already exist. To login as a different user, use -l login. [NOTE: you must have a .rhosts file set up properly for this to work, otherwise the remote login attempt will fail]. Merging Keys via rsh(1) and gzip(1) If your remote .Xauthority file is large, or to make it slightly less obvious that you're transferring authentication keys over the net- work, mkxauth can gzip(1) your .Xauthority file before retrieving it via rsh(1). To do this, use mkxauth -z host (see(5) above). mkxauth retrieves the remote .Xauthority from host using rsh(1) and adds those keys to ~/.Xauthority, replacing any keys which already exist. To login as a different user, use -l login. [NOTE: you must have a .rhosts file set up properly for this to work, otherwise the remote login attempt will fail]. Options To make mkxauth operate quietly, use the -q option. To add to ~login/.Xauthority, use the -u login option. To use login for the remote login in mkxauth -f, mkxauth -r, and mkxauth -z, use the -l login option. Getting Help To get quick help about mkxauth, use mkxauth --help. FILES
~/.Xauthority ~/.netrc ~/.rhosts COMMENTS
mkxauth is mostly useful for maintaining .Xauthority files in an environment which uses startx(1x). xdm(1x) uses its own method of gener- ating .Xauthority files. However, mkxauth is still useful for transferring .Xauthority information to remote login sessions so that the user can display remote X clients on the local host without too much trouble. Note, however, that using rsh(1) is inherently insecure, and sites concerned about security should use ssh(1) instead (see http://www.cs.hut.fi/ssh/ for more information). SEE ALSO
X(1x), Xsecurity(1x), gzip(1), mcookie(1), md5sum(1), ncftp(1), rsh(1), startx(1x), xauth(1x), xdm(1x) BUGS
Does not respect the XAUTHORITY environment variable. AUTHOR
Conceived and written by Jim Knoble <jmknoble@redhat.com>. Copyright 1996 by Jim Knoble and Red Hat Software. Distributed under the GNU GPL (General Public License); see ftp://prep.ai.mit.edu/pub/gnu/COPYING for more information. Red Hat Software 12-Dec-1996 mkxauth(1x)
All times are GMT -4. The time now is 05:04 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy