Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
IndexSoft

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Glossary
MoreInfo
Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
FAQ
Copyright Info
Terms of Use
Privacy Info
Disclaimer
WorkBoard
Thanks
Donations
Advertising
Masthead / Impressum
Your Account

Communication
Feedback
Forums
Private Messages
Surveys

Features
HOWTOs
News Archive
Submit News
Topics
User Articles
Web Links

Google
Google


The Web
linux-tutorial.info

Who's Online
There are currently, 191 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here

  

rcp


     rcp [-px] [-r] [-k realm] file ... directory


DESCRIPTION

     Rcp copies files between machines.  Each file or directory argument is
     either a remote file name of the form ``rname@rhost:path'', or a local
     file name (containing no `:' characters, or a `/' before any `:'s).

     -r    If any of the source files are directories, rcp copies each subtree
           rooted at that name; in this case the destination must be a direc­
           tory.

     -p    The -p option causes rcp to attempt to preserve (duplicate) in its
           copies the modification times and modes of the source files, ignor­
           ing the umask.  By default, the mode and owner of file2 are pre­
           served if it already existed; otherwise the mode of the source file
           modified by the umask(2) on the destination host is used.

     -k    The -k option requests rcp to obtain tickets for the remote host in
           realm realm instead of the remote host's realm as determined by
           krb_realmofhost(3).

     -x    The -x option turns on DES encryption for all data passed by rcp.
           This may impact response time and CPU utilization, but provides
           increased security.

     If path is not a full path name, it is interpreted relative to the login
     directory of the specified user ruser on rhost, or your current user name
     if no other remote user name is specified.  A path on a remote host may
     be quoted (using \, ", or ´) so that the metacharacters are interpreted
     remotely.

     Rcp does not prompt for passwords; it performs remote execution via
     rsh(1), and requires the same authorization.

     Rcp handles third party copies, where neither source nor target files are
     on the current machine.


SEE ALSO

     cp(1), ftp(1), rsh(1), rlogin(1)


HISTORY

     The rcp command appeared in 4.2BSD.  The version of rcp described here
     has been reimplemented with Kerberos in 4.3BSD-Reno.


BUGS

     Doesn't detect all cases where the target of a copy might be a file in
     cases where only a directory should be legal.

     Is confused by any output generated by commands in a .login, .profile, or
     .cshrc file on the remote host.

     The destination user and hostname may have to be specified as
  




Login
Nickname

Password

Security Code
Security Code
Type Security Code


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!


Amazon Wish List

Did You Know?
You can get all the latest Site and Linux news by checking out our news page.


Friends



Tell a Friend About Us

Bookmark and Share



Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.10 Seconds