blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
index.gif

ntcmds00000000.gif

Rsh--Notes

Standard operation

Rsh copies standard input to the remote command, standard output of the remote command to its standard output, and the standard error of the remote command to its standard error. Rsh normally terminates when the remote command does.

Using redirection symbols

Use quotation marks around redirection symbols to redirect onto the remote computer. If quotation marks are not used, redirection occurs on the local computer. For example, the following command appends the remote file remotefile to the local file localfile:

rsh othercomputer cat remotefile >> localfile

The following command appends the remote file remotefile to the remote file otherremotefile:

rsh othercomputer cat remotefile ">>" otherremotefile

Using rsh

When using a computer running Windows NT Server, the primary domain controller for the logged on domain must be available to verify the user name or the rsh command will fail.

The .rhosts File

The .rhosts file generally permits network access rights on UNIX systems. The .rhosts file lists computer names and associated logon names that have access to remote computers. When issuing rcp, rexec, or rsh commands to a remote system with a properly configured .rhosts file, you do not need to provide logon and password information for the remote computer.

The .rhosts file is a text file where each line is an entry. An entry consists of the local computer name, the local user name, and any comments about the entry. Each entry is separated by a tab or space, and comments begin with a hash mark (#), for example:

computer5 marie #This computer is in room 31A

The .rhosts file must be in the users home directory on the remote computer. For further information about a remote computers specific implementation of the .rhosts file, see the remote systems documentation.

More Information About Rsh

ntcmds00000001.gif Rsh

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609