www.delorie.com/gnu/docs/inetutils/inetutils_34.html   search  
 
Buy GNU books!


GNU networking utilities

[ < ] [ > ]   [ << ] [ Up ] [ >> ]         [Top] [Contents] [Index] [ ? ]

10.1 Invoking

The options are as follows :

`-K'
`--kerberos'
Turns off all Kerberos authentication.

`-d'
`--debug'
Turns on socket debugging (see setsockopt(2)) on the TCP sockets used for communication with the remote host.

`-k'
`--realm=REALM'
The option requests rsh to obtain tickets for the remote host in REALM realm instead of the remote host's realm as determined by krb_realmofhost(3).

`-x'
`--encrypt'
Turns on DES encryption for all data passed via the rsh session. This may impact response time and CPU utilization, but provides increased security.

`-l'
`--user'
By default, the remote username is the same as the local username. The -l option or the username@host format allow the remote name to be specified. Kerberos authentication is used, and authorization is determined as in rlogin(1).

If no command is specified, you will be logged in on the remote host using rlogin(1).

Shell metacharacters which are not quoted are interpreted on local machine, while quoted metacharacters are interpreted on the remote machine.
 
For example, the command

# rsh otherhost cat remotefile >> localfile

appends the remote file remotefile to the local file localfile, while

# rsh otherhost cat remotefile ">>" other_remotefile

appends remotefile to other_remotefile.

  webmaster     delorie software   privacy  
  Copyright 2003   by The Free Software Foundation     Updated Jun 2003