Sponsored Content
Full Discussion: Login Manager
Operating Systems Linux Login Manager Post 41902 by Synbios on Thursday 16th of October 2003 07:11:56 PM
Old 10-16-2003
SSH would be the best for remote access. Enable X on SSH if you want an interface.

About the login manager, just uninstall Gnome.
 

8 More Discussions You Might Find Interesting

1. HP-UX

Exceed or X-Manager for login

Hi, I have a HP-UX 11.11 server right now we are using putty for login by SSH now we want to the upgrade the Oracle of this server for that we need the connectivity through (Exceed or X-Manager) for GUI. Somebody please help me how can we connect this server by Exceed or X-Manager Thanks... (0 Replies)
Discussion started by: bhupals
0 Replies

2. Web Development

APACHE: Tie in Web Page login with server login

Hello, I have created a web page on a server using apache and added .htaccess and .htpasswd in the folder for authentification. I was wondering if there was anyway to tie-in the login for this page with the login used to logon to the server. i.e. the same login info. is used for both,... (2 Replies)
Discussion started by: WhotheWhat
2 Replies

3. Cybersecurity

APACHE: Tie in Web Page login with server login

Hello, I have created a web page on a server using apache and added .htaccess and .htpasswd in the folder for authentification. I was wondering if there was anyway to tie-in the login for this page with the login used to logon to the server. i.e. the same login info. is used for both, when... (1 Reply)
Discussion started by: WhotheWhat
1 Replies

4. Solaris

RAID manager or veritas volume manager

Can somebody kindly help me to determine which one i should choose to better manipulate OS volume. RAID manager or veritas volume manager? Any critical differences between those two? Thanks in advance. (5 Replies)
Discussion started by: beginningDBA
5 Replies

5. Solaris

error message rmclomv ... SC Login Failure for user Please login:

Hello World ~ HW : SUN Fire V240 OS : Solaris 8 Error message prompts 'rmclomv ... SC login failure ...' on terminal. and Error Message prompts continually 'SC Login Failure for user Please login:' on Single Mode(init S) The System is in normal operation, though In case of rain, Can... (1 Reply)
Discussion started by: lifegeek
1 Replies

6. AIX

User Account Login Login on your AIX server

I want to learn AIX. I would like to find someone who would be willing to give me a login to their AIX home lab server. My intent is to poke around and discover the similarities and differences of AIX compared to other *NIXs. I am a UNIX admin so I can think of what some immediate concerns may... (1 Reply)
Discussion started by: perl_in_my_shel
1 Replies

7. UNIX for Advanced & Expert Users

Can adding to a new group be effective in current login environment without re-login?

Hey folks, When a user is added to a new group, the user has to be log out and log in again to make the new group effective. Is there any system command or technique to refresh user group ID update without re-login? I am not talking about to use "login" or "su -l" commands which can only make... (2 Replies)
Discussion started by: hce
2 Replies

8. UNIX for Advanced & Expert Users

First login on KUbuntu 16.04 no SKEL copied with first login LDAPusers

Hello, we have an problem on kubuntu16.04 that when i login with ldap, and it is my first login, nothing is copied from skel. With SSH it is working fine. Can anyone say we how KDE setup an new first userlogin? Tested with SDDM and Lightdm. Thanks a lot! Best Regard darktux ----------... (1 Reply)
Discussion started by: darktux
1 Replies
SECSH(5)							    Lsh Manuals 							  SECSH(5)

NAME
secsh - the Secure Shell protocol DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components: The Transport layer protocol This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User authentication protocol This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server. The Connection protocol This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels. IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist. The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]). The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License. REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998 [SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998 [SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998 [SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998 [SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995 TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd. AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8) LSH
JANUARY 1999 SECSH(5)
All times are GMT -4. The time now is 12:47 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy