Solved

Automatic transfert from windows to unix machine

Posted on 2011-09-07
6
295 Views
Last Modified: 2012-05-12
Hello, I am looking for an easy way to set up automatic file transfert from windows to unix machine
0
Comment
Question by:cismoney
6 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 36495244
Define Automatic? Hourly? Weekly? When files change? please expand

rdist
0
 

Author Comment

by:cismoney
ID: 36495749
daily
0
 

Author Comment

by:cismoney
ID: 36495754
sorry  automatic :when files changes (updates...)
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 2

Assisted Solution

by:Ringthane
Ringthane earned 250 total points
ID: 36501098
I use the following:

1) Perl script on Windows (looping, sleeping 60 secs) checking for modified files. If so, copy it to a directory on a Unix system using FTP for a restricted user.

2) Perl script on Unix (started by cron, every minute) checking if files arrived in the directory, if so copy them to the right spot.
0
 

Author Comment

by:cismoney
ID: 36501385
can you post the script please
0
 
LVL 6

Accepted Solution

by:
Tomunique earned 250 total points
ID: 36502287
install putty on your windows machine
run puttygen to build a set of public/private keys
save public key on your unix machine's userid in it's $HOME/.ssh/authorized_keys file
   Perms become picky here... ensure all directoires from / all the way to the .ssh directory do NOT have write perms for group or other. (same with authorized_keys file).


on windows box, run

pscp  c:\windowspath\file   unixuserid@unixhostnameorip:/unixpath/to/savethefile

Using ssh-keys are far more secure than any password solution.
99% of the other solutions are going to have you store a clear-text password in a script.
using ssh-keys you do need to protect your private key, but, the public key could be posted on the internet, nobody can use it without the private counter-part.

Tom

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
This article describes how to set permissions to allow a limited-permissions user to start and stop a particular System Service.   It is always best to give users only the permissions that they need to perform their job, so tweaking particular permi…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now