10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi Folks,
I feel that I should be posting this in the Unix for Dummies Forum and will probably wish I'd created an account and done just that - but here goes anyway.
I have two identical servers both Dell R430's both running RedHat Enterprise Server 7.4 and the same kernel, both have the same... (16 Replies)
Discussion started by: gull04
16 Replies
2. Red Hat
what is the difference between Redhat Linux and Redhat Enterprise Linux. whereas Redhat linux have Server installation options too. (2 Replies)
Discussion started by: hananabbas
2 Replies
3. UNIX and Linux Applications
Can anyone help me outwith the post installation script.I'm newbie to scripting!
i need to customize the post installation script using kickstart..here are the requirements to be set
set permissions /etc/crontab =400
/etc/securetty=400
/etc/sysctl.conf=600
and following services to be set OFF... (1 Reply)
Discussion started by: bvkumar
1 Replies
4. Red Hat
Hi,
I am trying to do rsh on to a redhat EL 5 machine. It repeatedly asks me for the password and die after sometime. One might think that I am giving the wrong password. But I can do 'ssh' on to that machine with the same password.
Can someone tell me what I have been doing wrong?
... (2 Replies)
Discussion started by: eamani_sun
2 Replies
5. Linux
rsh windows xp with linux as4 appear @permision denied please help me (1 Reply)
Discussion started by: mosaieb268
1 Replies
6. Linux
Hi All,
Please help me how to install and configure rsh in Linux boxes and let me know where i get this software.
Thanks in advance...
Regards,
Sridhar. (3 Replies)
Discussion started by: sridhusha
3 Replies
7. UNIX for Dummies Questions & Answers
I seen a pool that said Linux was the most popular Unix download. I then seen Redhat Linux is the most popular Linux download. Is there a difference? Is it the better program/s? (6 Replies)
Discussion started by: Mr_Pinky
6 Replies
8. Slackware
Hi,
I use linux and it is a great OS, I use Redhat Linux 9 and I was wondering are they going to update 9 or they'll be leaving that to the fedora project?
I would like a stable linux distro.
Thanks
-n (9 Replies)
Discussion started by: Insomniac
9 Replies
9. UNIX Desktop Questions & Answers
I am wondering if anyone has copies (or can burn me a copy) of RedHat Linux.
I will pay shipping charges...
I don't have a CD burner and i dont want to run it off of my hard drive...
please email me at:
empireinfo623@yahoo.com
or
baldwitm@muc.edu (5 Replies)
Discussion started by: thedude623
5 Replies
10. UNIX for Dummies Questions & Answers
hi, just installed redhat linux 7.3 on my server, and put it in gnome gui. Does anyone know what software i need to run a web server??? and what software i need to set up a proxy to secure it?
also, if these are free to download, can you give me the links. Thanx (2 Replies)
Discussion started by: matt2kjones
2 Replies
RSH(1) BSD General Commands Manual RSH(1)
NAME
rsh -- remote shell
SYNOPSIS
rsh [-Kdnx] [-k realm] [-l username] host [command]
DESCRIPTION
Rsh executes command on host.
Rsh copies its standard input to the remote command, the standard output of the remote command to its standard output, and the standard error
of the remote command to its standard error. Interrupt, quit and terminate signals are propagated to the remote command; rsh normally termi-
nates when the remote command does. The options are as follows:
-K The -K option turns off all Kerberos authentication.
-d The -d option turns on socket debugging (using setsockopt(2)) on the TCP sockets used for communication with the remote host.
-k The -k option causes rsh to obtain tickets for the remote host in realm instead of the remote host's realm as determined by
krb_realmofhost(3).
-l By default, the remote username is the same as the local username. The -l option allows the remote name to be specified. Kerberos
authentication is used, and authorization is determined as in rlogin(1).
-n The -n option redirects input from the special device /dev/null (see the BUGS section of this manual page).
-x The -x option turns on DES encryption for all data exchange. This may introduce a significant delay in response time.
If no command is specified, you will be logged in on the remote host using rlogin(1).
Shell metacharacters which are not quoted are interpreted on local machine, while quoted metacharacters are interpreted on the remote
machine. For example, the command
rsh otherhost cat remotefile >> localfile
appends the remote file remotefile to the local file localfile, while
rsh otherhost cat remotefile ">>" other_remotefile
appends remotefile to other_remotefile.
FILES
/etc/hosts
SEE ALSO
rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3)
HISTORY
The rsh command appeared in 4.2BSD.
BUGS
If you are using csh(1) and put a rsh in the background without redirecting its input away from the terminal, it will block even if no reads
are posted by the remote command. If no input is desired you should redirect the input of rsh to /dev/null using the -n option.
You cannot run an interactive command (like rogue(6) or vi(1)) using rsh; use rlogin(1) instead.
Stop signals stop the local rsh process only; this is arguably wrong, but currently hard to fix for reasons too complicated to explain here.
Linux NetKit (0.17) August 15, 1999 Linux NetKit (0.17)