Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

makehosts(8) [ultrix man page]

MAKEHOSTS(8)						      System Manager's Manual						      MAKEHOSTS(8)

Name
       MAKEHOSTS - make symbolic links to hosts

Syntax
       /usr/hosts/MAKEHOSTS

Description
       The  command creates symbolic links to the command for each of the hosts as defined in the file.  If the file does not exist, then the com-
       mand creates the links for each of the hosts listed in the local file.  The resulting symbolic links populate the directory.

       The symbolic links are a convenience that allows users to type the name of a remote host on the network to log into that host.	For  exam-
       ple, the following command logs you into a remote host called
       # chicago
       If  you do not create the symbolic links, you must use the command to log into a remote host.  For example, to log into a remote host named
       type:
       # rlogin chicago

See Also
       rlogin(1c), rsh(1c), hosts(5), svc.conf(5)

4th Berkeley Distribution													      MAKEHOSTS(8)

Check Out this Related Man Page

rsh(1c) 																   rsh(1c)

Name
       rsh - remote shell

Syntax
       rsh host [-l username] [-n] command
       host [-l username] [-n] command

Description
       The  command  connects to the specified host, and executes the specified command.  The command copies its standard input to the remote com-
       mand, the standard output of the remote command to its standard output, and the standard error of the remote command to its standard error.
       Interrupt, quit and terminate signals are propagated to the remote command.  The command normally terminates when the remote command does.

       The  remote  username  used is the same as your local username, unless you specify a different remote name with the -l option.  This remote
       name must be equivalent, in the sense of to the originating account.  No provision is made for specifying a password with a command.

       If you omit command, then instead of executing a single command, you are logged in on the remote host using

       Shell metacharacters which are not quoted are interpreted on local machine, while quoted  metacharacters  are  interpreted  on  the  remote
       machine.  Thus the command

	  rsh otherhost cat remotefile >> localfile

       appends the remote file remotefile to the localfile localfile, while

	  rsh otherhost cat remotefile ">>" otherremotefile

       appends remotefile to otherremotefile.

       Host  names are given in the file Each host has one standard name (the first name given in the file), which is rather long and unambiguous,
       and optionally one or more nicknames.  The host names for local machines are also commands in the directory If you put  this  directory	in
       your search path then the can be omitted.

Options
       -l username	   Logs you in as the specified user, not as your user login name.

       -n		   Redirects all command input to

Restrictions
       The  command  is  confused by output generated by commands in a .cshrc file on the remote host.	In particular, `where are you?' and `stty:
       Can't assign requested address' are messages which can result if output is generated by the startup file.

       If you are using and put a in the background without redirecting its input away from the terminal, it blocks even if no reads are posted by
       the remote command.  If no input is desired you should redirect the input of to using the -n option.

       You cannot run an interactive command like Use

       Stop signals stop the local process only.

Files
       /etc/hosts
       /usr/hosts/*

See Also
       rlogin(1c)

																	   rsh(1c)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies