10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am on HP-UX.
Problem is that my remote script behaves different depending on execution method.
Method1 (Remote execution):
remsh remoteserver /home/myscript.sh
Method2 (Local execution):
remoteserver :/home#sh myscript.sh
In method 2, I can succesfully set timestamp with... (6 Replies)
Discussion started by: mrcrowley
2. UNIX for Advanced & Expert Users
Can any 1 tell me how to use REMSH command with example
actually i wanted to run the following command on different severs thru script "df -k .| tail -1 | tr -s ' ' ' ' | cut -d ' ' -f5" :)
please reply ASAP.:) (3 Replies)
Discussion started by: maddy_07
3. Shell Programming and Scripting
Im using remsh to execute shell script on remote server. And this script gets called from another AIX server.
My code is:
remsh $rHost -l $rUser -n "export JAVA_HOME=/usr/java6_64_SR7; export ORACLE_HOME=/oravl01/oracle/126.96.36.199;
export... (3 Replies)
Discussion started by: AB10
4. UNIX for Dummies Questions & Answers
I want to know all the options that are used for command remsh.
And also the prerequisites like entries in .rhosts file.
Can anybody share the link or document?
thanks. (1 Reply)
Discussion started by: AB10
5. Shell Programming and Scripting
I have script.
remsh 188.8.131.52 -l root './export $CD > test.output'
But I receive the following error.
+ remsh 184.108.40.206 -l root ./export $CD > test.output
To make it work, I remove the ' signs.... (1 Reply)
Discussion started by: mr_andrew
i am using 2 server- Solaris 5.9
i have tape device attached with 1 of my solaris server. But others not.
# modinfo|grep tape
152 13d43e4 1333c 33 1 st (SCSI tape Driver 1.231)
now i want to Backup DATA file and System File in Tape Drive.
How do I take data and... (3 Replies)
Discussion started by: thepurple
7. Shell Programming and Scripting
Any idea how to use remsh to duplicate whatsoever ( / ) from host1 to host2 across network with root?
Regards, (0 Replies)
Discussion started by: rauphelhunter
host Solaris 5.9 E250 host-name: sunsrv1
remote Solaris 5.8 Netra 250 host_name: sspfs_svr
i am able to remsh (or rsh)from remote to host
$ remsh sunsrv1 uname -n
but opposite way not possible;
# remsh sspfs_svr ls
sspfs_svr: Connection refused
# rsh -l username... (2 Replies)
Discussion started by: xramm
9. UNIX for Dummies Questions & Answers
dear unix gurus,
trying to search for this thread in the forum but can't seem to find any of them.
just would like to post 2 questions:
1) if there are spaces in the .rhosts file will it cause problems for users who try to run the program/ script? :confused:
2) does the .rhosts file be... (10 Replies)
Discussion started by: lweegp
10. UNIX for Dummies Questions & Answers
i m try to do remsh i need to know what are the step to define the user and password i try .rhosts it give me
operator:/export/home/operator>remsh billmed ps -ef
just for testing (3 Replies)
Discussion started by: kazanoova2
rhosts(5) File Formats Manual rhosts(5)
rhosts - list of hosts that are logically equivalent to the local host
The file allows a user who has an account on the local host to log in from a remote host without supplying a password. It also allows
remote copies to the local host.
If the file exists, it is located in a user's home directory. It is not a mandatory file, however.
The format of a file entry is:
The hostname is the name of the remote host from which the user wants to log into the local host. The username is the user's login name on
the remote host. If you do not specify a user name, the user must have the same login name on both the remote and local hosts.
The host names listed in the file may optionally contain the local BIND domain name. For more information on BIND, see the Guide to the
If a user is logged in to and wants to log in to a host called without supplying a password, she must:
o Have an account on
o Create a file in her home directory on
o Specify host1 ginger as an entry in the file.
If has the same login on both and she can simply specify host1 in her entry. You can allow the superuser of a remote system to log in
to your system without password protection or perform a remote copy by having a file in the root ( / ) directory, but it is not recom-
In addition to having a file, the superuser needs a terminal entry in the file for each pseudoterminal configured in the system. The
secure entry looks similar to the following:
ttyp3 none network secure
See the reference page for more information.
The following is a sample file for the user It is located in her home directory on She also has accounts on the hosts called and Her login
name on and is the same as on but her login on is
To enable to log in to from and without supplying a password, her on should contain the following entries:
Introduction to Networking and Distributed System Services