01-02-2008
If you have a choice then go with openssh like Porter suggested. just google "ssh tutorial" and you will find many links. avoid rsh and other r* commands like the plague.
10 More Discussions You Might Find Interesting
1. Programming
Hi !
Please tell me how to get radio buttons, text boxes , check boxes , option buttons , pull down menus in C++ on Unix.
I think it would be done using curses.h ..but that's all i know.
TIA,
Devyani. (3 Replies)
Discussion started by: devy8
3 Replies
2. UNIX for Dummies Questions & Answers
hi there!
I have a small, probably very dumb question. Is it possible to connect two linux boxes with each other over COM ports for terminal connection? (4 Replies)
Discussion started by: D-Lexy
4 Replies
3. HP-UX
Dear Friends,
I am unable to do rsh from Redhat Linux AS 3.0 to HP-UX 11.11. It takes lot of time request times out.
What could be the reason.
regards
Rajendra More (0 Replies)
Discussion started by: rajendramore
0 Replies
4. Shell Programming and Scripting
Hello I'm serving on a ship that has frequent power issues. Currently if we loose power we need to rush around to multiple UNIX machines and login to Sysadmin and power down each machine before we loose our ups. If sysadmin is asleep or not in the space we have some real problems. I would like to... (2 Replies)
Discussion started by: blackfam972
2 Replies
5. Linux
rsh windows xp with linux as4 appear @permision denied please help me (1 Reply)
Discussion started by: mosaieb268
1 Replies
6. Linux
hi , i have 2 linux boxes with linksys wireless adapters everything is working fine.now i am trying to run client-server program written in C on these boxes but none of the box is receiving any packets. how different it is when using wireless . All these codes that i have works fine on Unix though... (1 Reply)
Discussion started by: phantom308
1 Replies
7. Red Hat
Hi,
I am trying to do rsh on to a redhat EL 5 machine. It repeatedly asks me for the password and die after sometime. One might think that I am giving the wrong password. But I can do 'ssh' on to that machine with the same password.
Can someone tell me what I have been doing wrong?
... (2 Replies)
Discussion started by: eamani_sun
2 Replies
8. AIX
Two boxes we just reloaded to use as a two node HACMP cluster to insure our software is compatible.
Install disks we received at our library on 5/2009 AIX 5.3-ML10
For sake of argument names ibmaix1 and ibmaix2
On both:
ibmaix1# oslevel -r
5300-10
.rhosts files with 600 permissions... (0 Replies)
Discussion started by: DrKillPatient
0 Replies
9. Red Hat
Hi. As root, I'm running rsh as root from a Solaris 9 machine to some RHEL 4 servers (supposedly all configured identically) but two of about 10 respond with permission denied. There is no firewall device between the Solaris 9 client and the RHEL servers.
I'm doing something like this from the... (4 Replies)
Discussion started by: th1amigo
4 Replies
10. Shell Programming and Scripting
I have requirement to login into a multiple linux boxes by running the shell script in a single linux box and to find the count of files in a specific folder in each box and log them in a log file in the box where i m runnning the script. Box names will be stored in a text file host.txt.
Please... (2 Replies)
Discussion started by: Mani2512
2 Replies
LEARN ABOUT DEBIAN
netkit-rsh
RSH(1) BSD General Commands Manual RSH(1)
NAME
rsh -- remote shell
SYNOPSIS
rsh [-Kdnx] [-k realm] [-l username] host [command]
DESCRIPTION
Rsh executes command on host.
Rsh copies its standard input to the remote command, the standard output of the remote command to its standard output, and the standard error
of the remote command to its standard error. Interrupt, quit and terminate signals are propagated to the remote command; rsh normally termi-
nates when the remote command does. The options are as follows:
-K The -K option turns off all Kerberos authentication.
-d The -d option turns on socket debugging (using setsockopt(2)) on the TCP sockets used for communication with the remote host.
-l By default, the remote username is the same as the local username. The -l option allows the remote name to be specified. Kerberos
authentication is used, and authorization is determined as in rlogin(1).
-n The -n option redirects input from the special device /dev/null (see the BUGS section of this manual page).
If no command is specified, you will be logged in on the remote host using rlogin(1).
Shell metacharacters which are not quoted are interpreted on local machine, while quoted metacharacters are interpreted on the remote
machine. For example, the command
rsh otherhost cat remotefile >> localfile
appends the remote file remotefile to the local file localfile, while
rsh otherhost cat remotefile ">>" other_remotefile
appends remotefile to other_remotefile.
FILES
/etc/hosts
SEE ALSO
rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3)
HISTORY
The rsh command appeared in 4.2BSD.
BUGS
If you are using csh(1) and put a rsh in the background without redirecting its input away from the terminal, it will block even if no reads
are posted by the remote command. If no input is desired you should redirect the input of rsh to /dev/null using the -n option.
You cannot run an interactive command (like rogue(6) or vi(1)) using rsh; use rlogin(1) instead.
Stop signals stop the local rsh process only; this is arguably wrong, but currently hard to fix for reasons too complicated to explain here.
Linux NetKit (0.17) August 15, 1999 Linux NetKit (0.17)