rlogin enables a user to log in on another
server via
computer network, using
TCP network port 513. is also the name of the
application layer protocol used by the software, part of the
TCP/IP protocol suite. Authenticated users can act as if they were physically present at the computer. RFC 1282, in which it was defined, states: "The facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output." communicates with a
daemon, , on the remote host. is similar to the
Telnet command, but is not as customizable and is able to connect only to Unix-like hosts.
rsh opens a
shell on a remote computer without a
login procedure. Once connected, the user can execute commands on the remote computer through the shell's
command-line interface. passes input and output through the
standard streams, and it sends
standard output to the user's
console. Over the network,
standard input and standard out flow through TCP port 514, while
Standard Error flows through a different TCP port, which the
daemon () opens.
rexec Like , enables the user to run shell commands on a remote computer. However, unlike the rsh server, the server () requires login: it authenticates users by reading the username and password (unencrypted) from the
network socket. uses TCP port 512.
rcp can copy a file or directory from the local system to a remote system, from a remote system to the local system, or from one remote system to another. The command line
arguments of and are similar, but in remote files are prefixed with the name of the remote system: rcp file.txt subdomain.domain:~/home/foo/file.txt As with the Unix copy command
cp, overwrites an existing file of the same name in the target; unlike , it provides no mechanism for warning the user before overwriting the target file.
rwho Just as the
who command lists the users who are logged in to the local Unix system, lists those users who are logged into all
multi-user Unix systems on the local network. It displays the user name, the name of the
host from which the user is connected, and the start date and time of the login session. 's daemon, , maintains a database of the status of Unix systems on the local network. The daemon and its database are also used by the program. Unlike the
finger protocol, rwho does not display information from users' .plan or .project files, such as a user's real name or
email address.
rstat returns performance statistics from the kernel.
ruptime Just as the command shows how long a Unix system has been running since the last restart, requests a status report from all computers on the local network. It then returns the uptime report. If a computer did not respond within the time limit, then reports that the system is
down. This information is tracked and stored by the daemon , which is also used by the rwho command. ==Security==