Moving Files In Linux - page 3
The Low Security Family
rcp is a member of the old "r" (remote) command family, which includes both rlogin and rsh. Generally speaking, it's best to avoid this group of programs like the potential security plague they are. To use any of the "r" tools, you set up a file containing a list of machines and users who can access this machine without having to log in. There's no security implemented, no tunneling to hide data passing, no passwords needed to use it.
The biggest problem with this collection of tools, and the reason I'm not going to cover how to use it, is that once someone breaks into a single account set up to use the "r" tools, they've just gained access to accounts and machines that this account can get to without needing passwords. This is a great way to give an intruder access all over your network. Please don't.
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linux 3.10 Goes Long, Linux 3.11 Advances as LXDE Merges
- 3Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 4Why Linux is Super (Computing)
- 5Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic