Solved

What is rsh or ssh

Posted on 2004-09-11
3
891 Views
Last Modified: 2012-05-05
I wonder what rsh and/or ssh are??
What is their relation to tcp/ip ??

A very brief explanation is ok.
I googled but found nothing understandable and brief...
0
Comment
Question by:Confettis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Expert Comment

by:Luxana
ID: 12036328
this must help:

http://www.linuxfocus.org/English/March2003/article273.shtml

So it means that you can use SSH (secure Shell) for remote login to another system where is sshd service runnig.  It is working on port 22 and I just add that in windows you can use for example putty.exe

http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

also need to know about scp wich is secure copy between two systems. Windows client is pscp.exe.

I hope this help

Luxana
0
 
LVL 10

Accepted Solution

by:
Luxana earned 45 total points
ID: 12036373
Little example:

I have I for example linux server runnig on my network with sshd service on it on IP 10.0.0.1. So I can remotly login to my server from another host on my network and get my shell promt runnnig. So from another host network I use command:

# ssh 10.0.0.1 ( if this client is linux)
or
use putty.exe ( from windows)

this example is on LAN network but you can also use ssh on WAN networks as well.

0
 

Author Comment

by:Confettis
ID: 12036422
OK. Thanks a lot.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Resolve DNS query failed errors for Exchange
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question