As you might have seen with telnet, that you must enter a username and password in order to log on to another host. This may not work out well for those people who need to remotely log in to other hosts often . They want that the other host automatically to trust them so that when issued a remote login request, the system would allow them access without asking for a login and password.
The double-win has a feature like that and has the ability to automate tasks that require one host to invoke a program on another host.
To accommodate this in Linux, the rsh command was created. In its simplest form, specify the name of the host you wish to log in to, same as the way you would do for telnet. For example:
[rwhite@workbox rwhite]$ rsh gregory
If you have set up your configuration files so that gregory knows to trust you, the system will automatically give you a shell prompt. If the configuration file does not automatically trust you, you will need to enter your password again.
To set up the configuration file, edit the .rhosts file ( there is a period in front of the filename) in your home directory. Open the .rhosts file and create a line that looks like this:
host_to_trust your_username
And If you want to rsh from workbox to gregory without being prompted for a password, create the following file in an .rhosts file in your home directory on gregory:
workbox rwhite
And thats it you are ready to go!
The rsh enables you to login remotely at shell prompt of other server but than again there is a utility known as ssh(secure shell client). Just have a look at that too and than decide which one you would like to use.
Blogroll
Glossary
Installing Linux On a Server
- Installing and configuring Vmware2 to Run Linux (R...
- Installing Linux in a Server Configuration
- Performing Preinstallation Evaluation
- Linux System Administrator
- Installing and Configuring Servers
- Installing and Configuring Application Software
- Creating and Maintaining User Accounts
- Backing Up and Restoring Files
- Monitoring and Tuning Performance
- Configuring a Secure System
- Using Tools to Monitor Security
- Server Design
- Uptime
- Dual-Booting Issues
- Methods of Installation
- Determining a Server’s Functions
- Using the Red Hat Package Manager
- Initialization Scripts
Network Configuration
Filesystem Primer
- Understanding Filesystem Hierarchy Standard
- Basic Linux Directory Structure
- Partition Schemes
- Managing Partitions
- Managing partitions with fdisk
- Adding A New Hard Drive
- Basic Linux Formats
- Formatting a partition
- Tuning
- Troubleshooting With FSCK
- Exploring Logical Volume Management
- File Permissions 1
- File Permissions 2
- umask
- Concept of the i-Nodes and Superblocks in Linux/Un...
- Understanding ext3 file system and its advantages
Administering Users and Groups Securely
Network File System
Comments
Install Softwares
- Install Vuze(Azureus) Bittorent client on Linux 64..
- Install Skype(pc2pc calling software) On Linux 64 ...
- Install WEBMIN to Graphically Administer Your Linu...
- Opening And Extracting .rar Files in Linux/Unix sy...
- Installing vlc player in Fedora/Red Hat/ CentOS
- Linux text to speech festival
- Installing Thunderbird E-mail client
Post a Comment