Please Whitelist This Site?

I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)

If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.

If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.

Thanks for your understanding!

Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide


NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.

The Book is Here... and Now On Sale!

Read offline with no ads or diagram watermarks!
The TCP/IP Guide

Custom Search







Table Of Contents  The TCP/IP Guide
 9  TCP/IP Application Layer Protocols, Services and Applications (OSI Layers 5, 6 and 7)
      9  TCP/IP Key Applications and Application Protocols
           9  TCP/IP Interactive and Remote Application Protocols
                9  Berkeley Remote ("r") Commands

Previous Topic/Section
Berkeley Remote ("r") Commands
Previous Page
Pages in Current Topic/Section
1
2
Next Page
Berkeley Remote Shell (rsh)
Next Topic/Section

Berkeley Remote Login (rlogin)
(Page 2 of 2)

Automating rlogin

In some organizations, many different UNIX hosts are used every day and needing to type passwords all the time when using rlogin was deemed to be somewhat of a chore. On these systems, it is possible for administrators to set up control files that specify combinations of host names, user names and passwords. If set up correctly, this enables an authorized user to utilize rlogin to remotely access a host automatically, without having to enter either a login name or password, which can be a time savings.

rlogin Security Concerns and slogin

As originally designed, rlogin is a classic example of a protocol from the early days of TCP/IP: it emphasizes simplicity and usability over security. This is especially true of the automated login process just described. The original schemes used by rlogin for authentication are considered inadequate for modern TCP/IP internetworks, especially those connected to the Internet. Later versions of rlogin have been enhanced with more secure authorization methods. There is also a newer program called slogin (for secure login) that uses stronger authentication and encryption, and is intended to replace rlogin on newer systems.

Key Concept: The Berkeley remote or “r” commands facilitate remote operations between UNIX hosts on a TCP/IP internetwork. The base command of the family is the remote login command, rlogin, which allows a device on one host to access and use another as if he or she were locally connected to it. rlogin is often used as an alternative to Telnet, but is simpler both conceptually and practically.



Previous Topic/Section
Berkeley Remote ("r") Commands
Previous Page
Pages in Current Topic/Section
1
2
Next Page
Berkeley Remote Shell (rsh)
Next Topic/Section

If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005

© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.