Solved

Remote Login

Posted on 2004-04-08
6
214 Views
Last Modified: 2010-03-18
sir ,

     i m working on a  project linux networking.


        say , there r 2 computers A & B  works on
Red Hat 9 version.

       There is a server program in each system.
It loads as a daemon.
There r many client programs which asks for services from one to another .Server process request and send back result .The whole network is  done by berkely socket() .. functions .

i  know that in linux before login prompt appears
all the daemons and network setup etc are loaded
or initialised .
 
      suppose i m working on system A . system
B is at Login Prompt. both server in systems
r working.
     

 my question:->
*************
      i want to control getty process on system B
from system A .

 

     
0
Comment
Question by:karana
  • 2
6 Comments
 
LVL 6

Expert Comment

by:karlwilbur
ID: 10792745
What do you want to do with the getty processes?  Are you trying to restart them? stop them? kill them? start more?

The login prompts are using getty.  These were started by init (see /etc/inittab).  That's why you can login in:-).

I thin that I'll need more data from you as to what you are trying to do.

-Karl
0
 

Author Comment

by:karana
ID: 10795631
a daemon is running . i want   to open a terminal say tty1 in B from A
0
 
LVL 1

Accepted Solution

by:
ipuschner earned 25 total points
ID: 10822527
How about SSH?! You can login over IP and it's safe.
0
 
LVL 6

Assisted Solution

by:karlwilbur
karlwilbur earned 25 total points
ID: 10824348
Yeah, SSH.  ipuschner is right.

Make sure that the sshd is running on the host system (the ssh "server")then from the client, type:

ssh username@hostname

or

ssh username@hostipaddress

this gets you a session on the host box and you can execute commands just as if you were sitting at the console, mostly.  You might want to learn about nohup.

-Karl
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question