OpenSSH and Tectia can be tailored in various ways by compile-time configuration with the configure script. We’ve covered the SSH-specific flags, but remember that other operating-system-specific flags might also apply to your installation, so be sure to read the installation notes supplied with the software.
Once installed, SSH software can replace the insecure r-commands on your Unix system, not only when run directly, but also within other programs that invoke rsh, such as Emacs and Pine.
3.14.142.115