10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello All,
My question is about VNC'ing to a Linux server on the network.
MY PC: OpenSuSE 11.4 (i586)
Remote Server: OpenSuSE 12.3 (x86_64)
### UNAME:
# uname -a
Linux localhost.foo.bar 3.7.10-1.1-desktop #1 SMP PREEMPT Thu Feb 28 15:06:29 UTC 2013 (82d3f21) x86_64 x86_64 x86_64... (1 Reply)
Discussion started by: mrm5102
1 Replies
2. Ubuntu
hi,
I have a netbook with duo boot (win7 starter + ubuntu 12.04).
I tested it only in ubuntu and I could not set illumination by pressing "function+right arrow" or "function+left arrow" buttons.
Has anybody ever faced similar problem?
Thanks in advance
Boris (6 Replies)
Discussion started by: baris35
6 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I use the shortcut keys CTRL-a and CTRL-e to move cursor to start and end of line in shell prompt alot. But recently what happened to my system i don't know only CTRL-a is working not CTRL-e . If i press CTRL-e any other window in that desktop pop's up. Can any1 tell me how to correct... (2 Replies)
Discussion started by: vio719
2 Replies
4. Red Hat
Hi,
I've generated and posted pub. keys in the source system and the target. However, it is still prompting me for the password.
Steps that I have taken.
1. Generated ssh keys : ssh-keygen. It created two files.
1. .ssh/id_rsa
2. .ssh/id_rsa.pub.
2.... (10 Replies)
Discussion started by: Afi_Linux
10 Replies
5. Solaris
Hello,
I hope I put this in the right forum...
I searched for similar threads, but I couldn't find any that seem to deal with the problem I am having.
My workplace is using (among other Solaris-machines) Dell Dimension T3500 as workstations (running Solaris 10 X86 10/09 u8,... (0 Replies)
Discussion started by: areichart
0 Replies
6. UNIX for Advanced & Expert Users
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
7. Shell Programming and Scripting
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
8. UNIX for Dummies Questions & Answers
Hi
I am working on SunOS 5.10 from remote terminal using putty.
Also
echo $TERM
xterm
In vi editor when in insert mode arrow keys are not working for cursor movement instead they print A B C and D.
Please help.
thanks
ravs (7 Replies)
Discussion started by: ravashingravi
7 Replies
9. Windows & DOS: Issues & Discussions
Hi, In my MSDOS version on windows'98, many keys are not working. I feel that my version is old and I wnt to update it. Can anyone tell me how can i do so.
Please tell me soon.
Thanks a lot.
-Kinnaree
:confused: (1 Reply)
Discussion started by: kinnaree
1 Replies
10. UNIX for Dummies Questions & Answers
Hello everyone, I want to host a mud and I found the cheapest way to do this was to install Linux on my computer and use it as the server. I downloaded both of the ISO images, it took 16 hours but i did it. But, I have no CD burner. I read that I could make a boot diskette, but how do i get... (3 Replies)
Discussion started by: Frax
3 Replies
RPMKEYS(8) System Manager's Manual RPMKEYS(8)
NAME
rpmkeys - RPM Keyring
SYNOPSIS
rpmkeys {--import|--checksig}
DESCRIPTION
The general forms of rpm digital signature commands are
rpmkeys --import PUBKEY ...
rpmkeys {-K|--checksig} PACKAGE_FILE ...
The --checksig option checks all the digests and signatures contained in PACKAGE_FILE to ensure the integrity and origin of the package.
Note that signatures are now verified whenever a package is read, and --checksig is useful to verify all of the digests and signatures
associated with a package.
Digital signatures cannot be verified without a public key. An ASCII armored public key can be added to the rpm database using --import.
An imported public key is carried in a header, and key ring management is performed exactly like package management. For example, all cur-
rently imported public keys can be displayed by:
rpm -qa gpg-pubkey*
Details about a specific public key, when imported, can be displayed by querying. Here's information about the Red Hat GPG/DSA key:
rpm -qi gpg-pubkey-db42a60e
Finally, public keys can be erased after importing just like packages. Here's how to remove the Red Hat GPG/DSA key
rpm -e gpg-pubkey-db42a60e
SEE ALSO
popt(3),
rpm(8),
rpmdb(8),
rpmsign(8),
rpm2cpio(8),
rpmbuild(8),
rpmspec(8),
rpmkeys --help - as rpm supports customizing the options via popt aliases it's impossible to guarantee that what's described in the manual
matches what's available.
http://www.rpm.org/ <URL:http://www.rpm.org/>
AUTHORS
Marc Ewing <marc@redhat.com>
Jeff Johnson <jbj@redhat.com>
Erik Troan <ewt@redhat.com>
Panu Matilainen <pmatilai@redhat.com>
Red Hat, Inc 29 October 2010 RPMKEYS(8)