We have SLES10x up and running under z/VM and most of our processes in 
place. I am now developing the Linux Rescue of Last Resort Procedures for 
SLES10. I know, I can use any of my Linux z/VM guests as a rescue system 
but I always keep a rescue system of last resort.

Under SLES10, I can get a rescue system up but I do not have access from 
PuTTy. I can gen the SSH keys and start my network but when I try to login 
using PuTTy, it prompts me for a id and I enter root, and then it prompts 
for root?s password. I have no idea what the root password is on the 
rescue system. I never prompted me with a password like SLES9x did.

The reason for the PuTTy session is to edit files. Unless someone has a 
method of editing files from the z/VM Linux 3270 console.

Did anyone else have this problem? SLES10 rescue is not as nice as 
SLES9?s. Thanks for any insights.

Peter



This Email message and any attachment may contain information that is
proprietary, legally privileged, confidential and/or subject to copyright
belonging to Pepco Holdings, Inc. or its affiliates ("PHI").  This Email is
intended solely for the use of the person(s) to which it is addressed.  If
you are not an intended recipient, or the employee or agent responsible for
delivery of this Email to the intended recipient(s), you are hereby notified
that any dissemination, distribution or copying of this Email is strictly
prohibited.  If you have received this message in error, please immediately
notify the sender and permanently delete this Email and any copies.  PHI
policies expressly prohibit employees from making defamatory or offensive
statements and infringing any copyright or any other legal right by Email
communication.  PHI will not accept any liability in respect of such
communications.

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to