Solved

Script for cross platform

Posted on 1998-12-10
4
189 Views
Last Modified: 2013-12-23
i want to write a script in the bat file which will login into the telnet session from windows side or DOS side.
0
Comment
Question by:shenoyvaib
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1582706
@echo off
telnet hostname


AFAIK, there is no way to automate login (send username and password) from DOS to UNIX, 'cause UNIX's telnetd (login) always reads from the tty.
0
 
LVL 1

Expert Comment

by:toTo
ID: 1582707
Other than telenet , there are some clients that can connect
to UNIX from DOS automaticaly :
i know rsh in the LanWorkPlace tcp suite from Novell
provided you have set /etc/hosts and ~toto/.rhosts
rsh hostname -l toto date
will run the command date on the host
i think you could find a rlogin but am not sure.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1582708
toTo, yes rlogin, rsh (and friends) may do it if setup properly, means they don't require a password.
Most (hopefully any) UNIX programs read their password from tty. rsh, rlogin, etc. will do it too.
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 100 total points
ID: 1582709
shenoyvaib, are you still reading here?
0

Featured Post

Supports up to 4K resolution!

The VS192 2-Port 4K DisplayPort Splitter is perfect for anyone who needs to send one source of DisplayPort high definition video to two or four DisplayPort displays. The VS192 can split and also expand DisplayPort audio/video signal on two or four DisplayPort monitors.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month3 days, 19 hours left to enroll

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question