On Thu, 2004-09-16 at 22:18, Scot L. Harris wrote: > On Thu, 2004-09-16 at 22:08, Michael E. Webster wrote: > > > > > Ben, > > > > Take a look at rsh - it will do what you're wanting. > > > > > > Mike. > > But it is rarely a good idea to use any of the "r commands" due to > potential security problems. > True, unless you have the boxen locked down. If you're only allowing incoming connections from a certain IP, name, or subnet (and they are trusted) there is minimal risk. It all depends on how your systems are configured and how anal you are about security. If you leave your box wide open, you're asking for trouble. Mike.
Attachment:
signature.asc
Description: This is a digitally signed message part