Can I keep ssh files from being "NonPrejudice" when it comes to local AND remote files with multiple hosts?

Well, have you tried using "stat . Ssh" or "stat . Ssh/authorized_keys" on the remote to view the access, modification and creation time stamps as you login?

And similarily "stat /etc/ssh", "stat /etc/sshd_config", "stat . Ssh/id_rsa (or dsa)" to see what the timestamps look like and if they change pre and post login from the local? Performing an "ls" command can give you the same info, but "stat" shows it all in one tidy area.

Not sure if you're trying to keep your local and remote host file access times in sync or if you're just curious to know how your system changes, but those are first steps I'd do. If you could expound on the desired outcome you're trying to achieve, I could give this more thought and craft a better answer. Cheers, Sr.

Unix / Linux Sysadmin 10+ Years.

1. SSH uses a private/public key authorization. 2.

The private key is your security and must be protected. The public key is open to the public. 3.

SSH uses encryption point to point. The information passing on the line can not be decoded without the private key. A prime number hash so improbable that super computers would take generations to break.4.

SSH encode uses CPU cycles to encode and decode slowing down the through speed. 5. The maintenance of SSH requires a knowledge of Unix or Linux.6.

The SSH connection is transparent to the user. Files can be browsed and transferred transparently.7. The SSH uses a series of event messages to communicate between server points.It works like telnet.

Messages events are passed between points. A series of events must be passed before transmission is permitted. Event Sequence of an SSH Connection: The following series of events help protect the integrity of SSH communication between two hosts.

A cryptographic handshake is made so that the client can verify that it is communicating with the correct server. The transport layer of the connection between client and remote host is encrypted using a symmetric cipher. The client authenticates itself to the server.

The remote client can now interact safely with the remote host over the encrypted connection. TCP: TCP provides connections that need to be established before sending data. TCP connections have three phases: A.

Connection establishment B. Data transfer C. Connection termination Here are the various states of a connection end-point or Internet socket: LISTEN SYN-SENT SYN-RECEIVED ESTABLISHED FIN-WAIT-1 FIN-WAIT-2 CLOSE-WAIT CLOSING LAST-ACK TIME-WAIT CLOSED LISTEN SYN-SENT represents waiting for the remote TCP to send back a TCP packet with the SYN and ACK flags set.(usually set by TCP clients) SYN-RECEIVED represents waiting for the remote TCP to send back an acknowledgment after having sent back a connection acknowledgment to the remote TCP.

(usually set by TCP servers) ESTABLISHED represents that the port is ready to receive/send data from/to the remote TCP.(set by TCP clients and servers) TIME-WAIT represents waiting for enough time to pass to be sure the remote TCP received the acknowledgment of its connection termination request. According to RFC 793 a connection can stay in TIME-WAIT for a maximum of four minutes. Ssh uses TCP protocol to communicate.

The shell is a Unix terminal screen. All the unix commands are available in the shell and remote commands are possible on remote machine.In System programming the remote procedure calls allow a remote machine to be control through tcp/ip and transmission of commands. At a high level, the secure shell was built ontop of this technology.

If your interesting in RCP system development, it will help you understand how the shell calls commands on the remote machine.

Started 6 years, 7 months ago by xds. Https://webknox.com/q/using-php-to-call-a-script-to-manipulate-files-or-sshYou can use exec method php.net/manual/en/function.exec.php. ... Curl sftp://user@host:22 curl: (1) Unsupported protocol: sftp – msandbot Jun 24 '10 at 12:26 i'm trying to get the IT guy to update curl, ssh2 also ... Can I keep ssh files from being "NonPrejudice" when it comes to local AND remote files with multiple hosts?

Irclogs.ubuntu.com/2009/02/07/%23ubuntu.txtCachedFeb 7, 2009 - 00:05 what caommand can I use to stream log content? Www.science.gov/topicpages/c/connectivity+predicts+individual.htmlCachedSleep deprivation (SD) can degrade cognitive functioning, but growing evidence .... with the degree of long-range connectivity but negatively correlated with local connectivity. .... are now being investigated as substrates for cognitive and affective .... Employing multiple-kernel Support Vector Machines (SVMs), we attempt to ...

I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.

Related Questions