answersLogoWhite

0

Both of these utilities allow a remote user to log in (remotely) and execute commands via the command line.

User Avatar

Wiki User

15y ago

What else can I help you with?

Continue Learning about Movies & Television

How do you get a new Ip address without getting the old one?

== == well it depends how you want to do it.You could always try this....( I don't )This is from http://whatismyipaddress.com/Below is something to try :(Here is what I use.....---


When you delete photos off your iPhone 4 is there anyway you can get them back?

Not really. There are some complex ways to retrieve files from electronic devices, but for the iPhone you have to jailbreak and download some SSH software that will allow you to access all your iPhone's data. And you may be able to find your pictures in some hidden files, but you may have already written over the hidden picture file. Sorry :(


How you would measure the height of any object that is to tall for you to touch the top using only your body or part thereof and trigonometry?

Actually, you don't even need to know your height. All you need to do is:1. pick any arbitrary point that is somewhat close the the object. preferably about as far away as the object is tall.2. measure the distance between the point you picked and the base of the object.3. use a protractor to measure the angle from the point you picked. The angle should be between the ground and the hypotenuse of your make believe triangle.4. Then, all you have to do is the math. Knowing your height, you could measure the lengths of your shadow and the object's shadow then use proportions to solve for the height of the object:h = your heights = length of your shadowH = object's heightS = object's shadow h/s = H/SSh/s = H


What training do astronauts do before a mission?

Preparation to go into space begins at school. All astronauts take science courses through high school and go to college to take science or engineering. Some are in the military. Many also have pilot's licenses and scuba diving experience. Once they are selected, astronauts begin a training program that includes courses in astronomy, the space shuttle, space history, and experiments. Not everyone who is trained goes into space because NASA wants the "best of the best" - meaning the best people of all the people qualified to go into space. Also, there is a large lineup for flights, meaning it could be years before a space opens up. When astronauts do go into space, they perform experiments. Most shuttle flights now go to the International Space Station, which is under construction, and astronauts will often go outside to put solar panels and supports on to the station. Their schedule is set out months before the flight so they know exactly what to do each minute they are in space.


Related Questions

What is the difference between RSH and SSH?

rsh and ssh are similar in that they can execute commands on remote systems. The main difference between the two (besides the actual TCP ports) is that rsh traffic is not encrypted and therefore a security risk; ssh traffic is encrypted. The other main difference is that ssh is a secure replacement for telnet, whereas rsh can log into a remote system using the rlogin protocol, which is similar but not the same as telnet.


What do you need to set up in order for the rsh command to work in Linux?

RSH has been obsolete for over 20 years. You would need to find the source code for it, along with the (equally obsolete) libraries and compile it yourself. Nowadays, the rsh command is usually symlinked to ssh. Using SSH just requires installing the SSH client package for your distribution (apt install openssh-client on Debian/Ubuntu, yum install openssh-clients on CentOS). It can't be used to connect to legacy RSH servers, though.


Is putty install in Linux?

You do not need to install PuTTY in Linux as there are built-in utilities that can do PuTTY's job (ssh, telnet)


How you configure rsh in aix?

First, I should mention the obligitary comment that you should use ssh rather than rsh (OpenSSH, for example, ships with AIX, I think on the bonus or linux tools CD).However, if you want to use rsh, configuring it on AIX is exactly the same as on every other platform.On the host that you want to rsh to create a .rhosts file in the user's home directory, owned by the user with permission 600. Put in itCode:host userwhere "host" is the host you are coming from and "user" is the user account you are coming from.There are other options and files, but this will work, so check out the man page if you want more info.


What is an SSH client used for?

An SSH client is often used for sending data over a secure connection between two networked computers. The best-known use for the SSH protocol is to access shell accounts.


Which directory holds encryption keys for users connection to ssh servers?

Typically it would be a hidden folder called ".ssh".


How do you use SSH?

SSH is extremely simple. Using the SSH client, you connect to the computer running the SSH server using the commandssh [ip address or hostname here]


Which of the secure shell utilities is used to establish a secured command-line connectionto a remote server?

Answer: SLOGIN. slogin is an SSH utility that provides secured command-line connections to a remote server.


What does a SSH Keygen actually do?

An SSH Keygen is used to generate, manage, and convert authentication keys for SSH authentication. With an SSH Keygen tool, a user can create passphrase keys for both SSH protocol version 1 and 2.


What is the name of the main SSH server config file?

/etc/ssh/sshd_config In some distributions it can be in odd places like /etc/sshd_config, /usr/local/etc/ssh/sshd_config


What protocol is meant to be a secure alternative to Telnet?

ssh


How do you install an SSH server in Linux?

Most Linux distributions will come with SSH preinstalled. If it's not, install the package "ssh".