9 More Discussions You Might Find Interesting
1. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
PGP encryption works manually but not with crontab
2. Relevant commands, code, scripts, algorithms:
Below... (4 Replies)
Discussion started by: sharath.molagav
4 Replies
2. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
3. UNIX for Advanced & Expert Users
Hi,
Could anyone please help me in understanding how PGP can be installed and configured in HP-UX machines.Is there any separate licence required ? and what are the minimum system requirements to have PGP installed on a server (1 Reply)
Discussion started by: tinivt
1 Replies
4. Linux
I have file in linux which I need to do the PGP encryption.
Through manually I am using this command to do the same
gpg -c scsrun.log
Enter passphrase :
Repeat Passphrase :
But how I can achive this using linux script.
Thanks
How to use code tags (3 Replies)
Discussion started by: mr_harish80
3 Replies
5. Solaris
Hi,
i am trying to encrypt a file using pgp with a recepient's public key. The file is encrypted but the output file has owner & group nobody. i am not able to change it either. Please let me know how to do pgp encryption so that i get the output with owner and group as the same user which runs... (4 Replies)
Discussion started by: renjyverghese
4 Replies
6. UNIX for Dummies Questions & Answers
Hello,
Does anyone know if it's normal to have a very different file size after a file has been encrypted using pgp?
Before encryption: 582.7618598938 MB
After encryption: 98.73 MB
Thanks in advance for any help, (2 Replies)
Discussion started by: tekster757
2 Replies
7. Cybersecurity
Hi All,
I am new to the concept of encryption and shell and i have been assigned to do pgp encryption of a file before ftping it.
I am developing the script using MKS Toolkit on Windows XP and the script will run later on actual unix box.
I am going through documents provided by pgp... (2 Replies)
Discussion started by: sandeepb
2 Replies
8. UNIX for Advanced & Expert Users
Hi
I have one script for doing the gpg encryption on linux.
The encrytion is doing fine when i am running the script from command prompt on linux
The same script when it is triggering from mainframe using sysopts option in NDM(connect direct) the encryption step in the shell script is... (0 Replies)
Discussion started by: Arvind Maurya
0 Replies
9. Solaris
Hi
Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server.
They will give me the pgp key to decrypt the file.
How can I do this on solaris 9
Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
Discussion started by: frustrated1
0 Replies
tels(7) Miscellaneous Information Manual tels(7)
NAME
tels, telm - STREAMS Telnet slave (pseudo-terminal) driver, STREAMS Telnet master driver (used by telnetd only), respectively
SYNOPSIS
DESCRIPTION
A Telnet pseudo-terminal consists of a tightly-coupled pair of character devices, called the master device and slave device. The master
and slave device drivers work together to provide a Telnet connection on the server side where the master provides a connection to and the
slave provides a terminal device special file access for the Telnet application processes, as depicted below:
--------------------------
| Pseudo terminal functions|
Application <--> |--------------------------| <--> telnetd
Processes | Slave | Master |
| (tels) | (telm) |
--------------------------
The slave driver, with (STREAMS pty emulation module) and (STREAMS line discipline module) pushed on top (not shown for simplicity), pro-
vides a terminal interface as described in termio(7). Whereas devices that provide the terminal interface described in termio(7) have a
hardware device behind them; in contrast, the slave device has manipulating it through the master side of the Telnet pseudo terminal.
There are no nodes in the file system for each individual master device. Rather, the master driver is set up as a STREAMS clone(7) driver
with its major device number set to the major for the clone driver and its minor device number set to the major for the driver. The master
driver is opened by telnetd using the open(2) system call with as the device file parameter. The clone open finds the next available minor
number for the master device. The master device is available only if it and its corresponding slave device are not already opened.
In order to use the STREAMS Telnet subsystem, a node for the master driver and N number of Telnet slave devices must be installed.
The number of slave devices is set by a kernel tunable parameter called This can be modified using SAM; its default and minimum value is
60. The value of is the upper limit of the number of telnet sessions that can be opened.
Multiple opens are allowed on the Telnet slave device.
The master and slave drivers pass all STREAMS messages to their adjacent drivers. When the connection is closed from the Telnet client
side, an message is sent to the corresponding slave device which will render that slave device unusable. The process on the slave side
gets the errno when attempting a write(2) system call to the slave device file but it will be able to read any data remaining in the slave
stream. Finally, when all the data has been read, the read(2) system call will return 0, indicating that the slave can no longer be used.
AUTHOR
and were developed by HP.
FILES
Streams Telnet master clone device
Streams slave devices where
N is the minor number of the slave device and 0 < N <
SEE ALSO
insf(1M), open(2), ioctl(2), streamio(7), ldterm(7), telnetd(1M), ptem(7).
tels(7)