Introduction to Unix |
|
|
|
6.2. Communication Between Hosts¶
Linux for Programmers and Users, Section 9.6
Here we list two commands for copying files betweens host (rcp and
scp) and two commands to remotely use a remote host (rsh and
ssh). The commands rcp and rsh are not secure (data is not
encrypted), while scp and ssh are secure. Only secure communication
commands should be run on networks, such as over the Internet, where untrusted
users might be present.
It is possible with both the secure and unsecure versions of these programs to
use them without the needed to type a password. The scp and ssh
programs do so using public and private key files. Instructions for how
to set this up can be found on various web pages on the Internet.
6.2.1. rcp¶
-
rcp Copy file(s) between hosts.
6.2.2. scp¶
-
scp Secure copy file(s) between hosts.
6.2.3. rsh¶
-
rsh Run a command (including a shell) on a remote computer.
6.2.4. ssh¶
-
ssh Securely run a command (including a shell) on a remote computer.
SYNOPSIS
ssh [userid@]hostname [command]
When not command is run on the remote host a login is attempted.
With both rsh and ssh, in addition to running a command on a remote
computer, data may be passed over the communication channel. See dd for
some examples.