Solved

What is rsh or ssh

Posted on 2004-09-11
3
888 Views
Last Modified: 2012-05-05
I wonder what rsh and/or ssh are??
What is their relation to tcp/ip ??

A very brief explanation is ok.
I googled but found nothing understandable and brief...
0
Comment
Question by:Confettis
  • 2
3 Comments
 
LVL 10

Expert Comment

by:Luxana
ID: 12036328
this must help:

http://www.linuxfocus.org/English/March2003/article273.shtml

So it means that you can use SSH (secure Shell) for remote login to another system where is sshd service runnig.  It is working on port 22 and I just add that in windows you can use for example putty.exe

http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

also need to know about scp wich is secure copy between two systems. Windows client is pscp.exe.

I hope this help

Luxana
0
 
LVL 10

Accepted Solution

by:
Luxana earned 45 total points
ID: 12036373
Little example:

I have I for example linux server runnig on my network with sshd service on it on IP 10.0.0.1. So I can remotly login to my server from another host on my network and get my shell promt runnnig. So from another host network I use command:

# ssh 10.0.0.1 ( if this client is linux)
or
use putty.exe ( from windows)

this example is on LAN network but you can also use ssh on WAN networks as well.

0
 

Author Comment

by:Confettis
ID: 12036422
OK. Thanks a lot.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now