O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

rsh

Executes commands on a remote computer

rsh [option] host [command line]

The rsh utility runs command line on host by starting a shell on the remote system. Without a command line rsh calls rlogin, which logs you in on the remote computer.

security || rsh Is Not Secure

The rsh utility uses host-based trust, which is not secure, to authorize your login. Alternatively, it sends your password over the network as cleartext, which is not a secure practice. Refer to “Trusted Hosts” on page 373. Use ssh (page 374) when it is available.

Arguments

The name of the remote computer must be given as host. Any arguments following host are part of command line, which is run on the remote system. You must quote special characters in command line if you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required