10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I wrote a small program to read lines from a file and count the lines. The program is as below:
filename=$1
count=0
cat $filename | while read -r line
do
printf "%5d:%s\n" $count "$line"
count=$((count + 1))
done
echo " $count "
After I run the program, the result is... (4 Replies)
Discussion started by: jianma
4 Replies
2. UNIX for Dummies Questions & Answers
For a variety of strange reasons, I've set up an arrangement by which a server responds with "Hi there" if I connect on a specified port. This is a typical transaction:
# telnet example.com 3334
Trying 123.456.789.101...
Connected to example.com.
Escape character is '^]'.
Hi there... (4 Replies)
Discussion started by: treesloth
4 Replies
3. Linux
ok, i need to test a list of addresses via telnet and make sure that i get a response like the following:
telnet anag.testboalo.com443
Trying 100.100.100.100...
Connected to anag.testboalo.com.
Escape character is '^]'.
The thing is, for each address I telnet to, the telnet hangs in... (4 Replies)
Discussion started by: SkySmart
4 Replies
4. Shell Programming and Scripting
Somewhat long story:
I have a simple Perl CGI script that uses Expect to Telnet to a device and grab some data, and then spits it back to Perl for display on the Webpage.
This works for many devices I've tried, but one device just fails, it keeps rejecting the password on this device, only... (1 Reply)
Discussion started by: jondo
1 Replies
5. UNIX for Dummies Questions & Answers
Hello everyone,
I have got this following script to telnet to other UNIX boxes from one UNIX box and then run a script to count a certain paramater. The following line connects to the other box(es):
(sleep 1; echo $username; sleep 1; echo $password ; sleep 1 ; echo y; sleep 1; echo "\r" ; sleep 1... (2 Replies)
Discussion started by: Rajat
2 Replies
6. AIX
hi all,
i have a problem in telnet.when i am using telnet to my new aix server it takes about 5min to open.
can any one tell what i have to do.???? (5 Replies)
Discussion started by: rrlog
5 Replies
7. UNIX for Dummies Questions & Answers
we migrated from a system with HPUX B.11.0 to HPUX 11.23 i64
the new server is the same IP as the old server. the old server is renumbered to something else to avoid conflict.
on the old system, we had a user named "ftp" . There is one person who daily will ftp files to the host using this... (15 Replies)
Discussion started by: LisaS
15 Replies
8. Linux
I'm trying to help convert my boss over to Linux. He has an HP/Compaq PC on which he installed Fedora Core 4 on. It's got a Linksys wireless card in it and we're using the NDIS wrapper to load the Windows driver for the chipset on that card. 'iwconfig' sees the card. We can configure the card. ... (1 Reply)
Discussion started by: deckard
1 Replies
9. HP-UX
Hi,
My network layout is:
Pub LAN
|
freeBSD
|
Internal LAN
|
+ telnet srv on HP-UX 10.x box
+ other services (http, pop3, smtp, ftp)...
I've the following problem:
Inside Internal LAN I can connect myself to HP-UX telnet but from Public LAN in some place is refusing me... (5 Replies)
Discussion started by: efrenba
5 Replies
10. IP Networking
Hello friends,
The problem is that we have one SunOS5.7 server, while attempting telnet to that server following error is occured -
ld.so.1: login: fatal: libc.so.1: open failed: Too many open files
The login on console is possible. The inetd daemon is running. inetd.conf and services... (3 Replies)
Discussion started by: rahul72
3 Replies
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)