If you can't load SSH on the Windows platform, then you will have to use WMI since that is what it is used for. I suggest looking at Dave Roth's books for some pretty good examples oh how to do this.
Thanks --- "Hemphill, Barry" <[EMAIL PROTECTED]> wrote: > > -----Original Message----- > > From: David Nicol [mailto:[EMAIL PROTECTED] > > > > On 4/20/05, Hemphill, Barry > <[EMAIL PROTECTED]> wrote: > > > > > The main requirement is that we can not install > any code on the > remote > > > systems. > > > > then you're dead in the water and the best thing > to do is walk out > > immediately. Any technology that could do what you > are asking would > > be a powerful intrusion tool (like "backorifice") > and would be an > > unacceptable security risk which would hopefully > be > > disabled in a security update lickety-split. > > David, > > I appreciate the comments, but I don't think I agree > with you. Virtually > all unix and linux variants have rsh/ssh and rexec, > which do pretty much > exactly what I'm looking for without being > unacceptable security risks. > It appears that it's possible to do what I'm > describing using WMI on > windows as well - the trick is figuring out exactly > how to do it, and > whether it can be done in perl. > > I think the distinction that has to be made is > whether the remote > invocation (or remote copying, etc.) uses > authentication and > authorization or some sort. Without it, certainly it > would be a security > hole, but with appropriate authentication controls, > I'd argue it's > actually a necessary management tool for systems in > any large > enterprise, which is why I'm baffled that Microsoft > has never come out > with any nice, simple rsh/ssh/rdist type tools for > windows. I have a > third part app which has most of the functionality > of rdist, but it sure > would be nice if it was a standard part of windows. > > Anyway, the original question is still pending - any > chance someone can > point me at a module, script or code snippet that > will let me launch a > remote process as described in the original email? > > Thanks again, > Barry > > > > *********************************************************************************** > This message contains confidential information and > is intended only for the individual named. If you > are not the named addressee you should not > disseminate, distribute or copy this e-mail. Please > notify the sender immediately by e-mail if you have > received this e-mail by mistake and delete this > e-mail from your system. E-mail transmission cannot > be guaranteed to be secured or error-free as > information could be intercepted, corrupted, lost, > destroyed, received late or incomplete, or could > contain viruses. The sender therefore does not > accept liability for any error or omission in the > contents of this message, which arises as a result > of e-mail transmission. If verification is required, > please request a hard-copy version from the sender. > *********************************************************************************** > > _______________________________________________ > ActivePerl mailing list > [email protected] > To unsubscribe: > http://listserv.ActiveState.com/mailman/mysubs > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com _______________________________________________ ActivePerl mailing list [email protected] To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs
