Solved

Remote Login

Posted on 2004-04-08
6
217 Views
Last Modified: 2010-03-18
sir ,

     i m working on a  project linux networking.


        say , there r 2 computers A & B  works on
Red Hat 9 version.

       There is a server program in each system.
It loads as a daemon.
There r many client programs which asks for services from one to another .Server process request and send back result .The whole network is  done by berkely socket() .. functions .

i  know that in linux before login prompt appears
all the daemons and network setup etc are loaded
or initialised .
 
      suppose i m working on system A . system
B is at Login Prompt. both server in systems
r working.
     

 my question:->
*************
      i want to control getty process on system B
from system A .

 

     
0
Comment
Question by:karana
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 6

Expert Comment

by:karlwilbur
ID: 10792745
What do you want to do with the getty processes?  Are you trying to restart them? stop them? kill them? start more?

The login prompts are using getty.  These were started by init (see /etc/inittab).  That's why you can login in:-).

I thin that I'll need more data from you as to what you are trying to do.

-Karl
0
 

Author Comment

by:karana
ID: 10795631
a daemon is running . i want   to open a terminal say tty1 in B from A
0
 
LVL 1

Accepted Solution

by:
ipuschner earned 25 total points
ID: 10822527
How about SSH?! You can login over IP and it's safe.
0
 
LVL 6

Assisted Solution

by:karlwilbur
karlwilbur earned 25 total points
ID: 10824348
Yeah, SSH.  ipuschner is right.

Make sure that the sshd is running on the host system (the ssh "server")then from the client, type:

ssh username@hostname

or

ssh username@hostipaddress

this gets you a session on the host box and you can execute commands just as if you were sitting at the console, mostly.  You might want to learn about nohup.

-Karl
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question