Moving Files In Linux - page 3
The Low Security Family
rcp is a member of the old "r" (remote) command family, which includes both rlogin and rsh. Generally speaking, it's best to avoid this group of programs like the potential security plague they are. To use any of the "r" tools, you set up a file containing a list of machines and users who can access this machine without having to log in. There's no security implemented, no tunneling to hide data passing, no passwords needed to use it.
The biggest problem with this collection of tools, and the reason I'm not going to cover how to use it, is that once someone breaks into a single account set up to use the "r" tools, they've just gained access to accounts and machines that this account can get to without needing passwords. This is a great way to give an intruder access all over your network. Please don't.
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.