Berkeley CSUA MOTD:Entry 17070
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

1999/12/19-21 [Computer/SW/Security] UID:17070 Activity:kinda low
12/18   Is anyone aware of an existing scp interface for Wind0ze?
        \_ Not a chance.
           \_ http://bmrc.berkeley.edu/people/chaffee/winntutil.html
              about 1/2 way down the page  -mikeh
                \_ This is bogus.
                   \_ How so?  It works for me.  -mikeh
                        \_ It doesn't properly follow the specs.
                           \_ Clarify?
                                \_ Read the spec and compare.
Cache (1595 bytes)
bmrc.berkeley.edu/people/chaffee/winntutil.html
Explanation on how the registry changes work and how you can create your own layouts. The site has some very useful utilities including a 12 CapsLock switcher. SSH is the Secure Shell, and it basically lets you do secure logins to Unix machines. I created is so that I could securely use remote CVS source code repositories. Since I live in the United States, I am a munitions dealer if I export this software. It allows you to run commands such as ssh remote_machine -l chaffee ls, and it even lets you log into other machines interactively, but it gives you only dumb terminal capabilities. For a version that might have full capabilities, try 21 this port of ssh or 22 TTSSH. You need to generate the keys on your Unix box with ssh-keygen as I haven't fixed it yet. SU command for Windows NT 23 Binary 24 Source Code 25 README For people coming from the Unix world, this command needs no explanation. For non-Unix people, su allows you to run a shell as a different user on the same desktop that you are logged in. This can be very useful if you need to do something as Administrator and you don't want to logout. Credit for this utility goes to 26 David Wihl and 27 Steffen Krause. It is used to dynamically load and unload NT device drivers. This can be helpful if you need to replace a system DLL that is normally always in use. Use with the -f option to forcibly overwrite an existing file. All rename operations should end up in the registry under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\ FileRenameOperations in case you need to stop a rename from occurring.