Solved

Remote Login

Posted on 2004-04-08
6
211 Views
Last Modified: 2010-03-18
sir ,

     i m working on a  project linux networking.


        say , there r 2 computers A & B  works on
Red Hat 9 version.

       There is a server program in each system.
It loads as a daemon.
There r many client programs which asks for services from one to another .Server process request and send back result .The whole network is  done by berkely socket() .. functions .

i  know that in linux before login prompt appears
all the daemons and network setup etc are loaded
or initialised .
 
      suppose i m working on system A . system
B is at Login Prompt. both server in systems
r working.
     

 my question:->
*************
      i want to control getty process on system B
from system A .

 

     
0
Comment
Question by:karana
  • 2
6 Comments
 
LVL 6

Expert Comment

by:karlwilbur
ID: 10792745
What do you want to do with the getty processes?  Are you trying to restart them? stop them? kill them? start more?

The login prompts are using getty.  These were started by init (see /etc/inittab).  That's why you can login in:-).

I thin that I'll need more data from you as to what you are trying to do.

-Karl
0
 

Author Comment

by:karana
ID: 10795631
a daemon is running . i want   to open a terminal say tty1 in B from A
0
 
LVL 1

Accepted Solution

by:
ipuschner earned 25 total points
ID: 10822527
How about SSH?! You can login over IP and it's safe.
0
 
LVL 6

Assisted Solution

by:karlwilbur
karlwilbur earned 25 total points
ID: 10824348
Yeah, SSH.  ipuschner is right.

Make sure that the sshd is running on the host system (the ssh "server")then from the client, type:

ssh username@hostname

or

ssh username@hostipaddress

this gets you a session on the host box and you can execute commands just as if you were sitting at the console, mostly.  You might want to learn about nohup.

-Karl
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now