Solved

Remote command on NT from UNIX

Posted on 1997-08-06
5
288 Views
Last Modified: 2013-12-23
I have an NT program which performs file manipulation.  I am running a program on Digital UNIX (Dec Alpha) and require that this NT program be kicked off by the Digital Unix program and can not continue until the NT program has terminated.  It is a real time program.  Accessing the file from NT side is not a problem, my problem is sending a remote command to NT from Digital Unix telling it to run this file manipulation package on a filename I specify.

Any suggestions on how to do this?  

-Joe Chickanosky
0
Comment
Question by:joechick
5 Comments
 

Expert Comment

by:tomii
ID: 1582226
Is it possible for you to automate a telnet session using a shell script?
0
 
LVL 3

Expert Comment

by:rickyr
ID: 1582227
Hiya....
Telnet is an interactive environment. Why would you want to automate it. I think it would be of more help to you if you outlined exactly what you are trying to achieve,
Including the flavour and version of UNIX you are trying to do something with.
0
 

Author Comment

by:joechick
ID: 1582228
Need to add more comments
0
 
LVL 2

Accepted Solution

by:
frederico earned 50 total points
ID: 1582229
This might depend on the program you are trying to use
You can try the software from www.esker.fr that has
a remote command server(RSH) (unix to win95 and vice-versa)
that I think will solve you problem.

Best regards1
0
 
LVL 2

Expert Comment

by:df020797
ID: 1582230
I would suggest you try out NTrigue. Its a modified NT kernel that allows Unix ystems to open NT windows local on the X screen at your workstation. Though its a commerical product...

0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question