Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
Kitty Hooch

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
Copyright Info
Terms of Use
Privacy Info
Masthead / Impressum
Your Account

Private Messages

News Archive
Submit News
User Articles
Web Links


The Web

Who's Online
There are currently, 68 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here




     Rlogin starts a terminal session on a remote host host.

     Rlogin first attempts to use the Kerberos authorization mechanism,
     described below.  If the remote host does not supporting Kerberos the
     standard Berkeley rhosts authorization mechanism is used.  The options
     are as follows:

     -8    The -8 option allows an eight-bit input data path at all times;
           otherwise parity bits are stripped except when the remote side's
           stop and start characters are other than ^S/^Q .

     -E    The -E option stops any character from being recognized as an
           escape character.  When used with the -8 option, this provides a
           completely transparent connection.

     -K    The -K option turns off all Kerberos authentication.

     -L    The -L option allows the rlogin session to be run in ``litout''
           (see tty(4)) mode.

     -d    The -d option turns on socket debugging (see setsockopt(2)) on the
           TCP sockets used for communication with the remote host.

     -e    The -e option allows user specification of the escape character,
           which is ``~'' by default.  This specification may be as a literal
           character, or as an octal value in the form \nnn.

     -k    The option requests rlogin to obtain tickets for the remote host in
           realm realm instead of the remote host's realm as determined by

     -x    The -x option turns on DES encryption for all data passed via the
           rlogin session.  This may impact response time and CPU utilization,
           but provides increased security.

     A line of the form ``<escape char>.'' disconnects from the remote host.
     Similarly, the line ``<escape char>^Z'' will suspend the rlogin session,
     and ``<escape char><delayed-suspend char>'' suspends the send portion of
     the rlogin, but allows output from the remote system.  By default, the
     tilde (``~'') character is the escape character, and normally control-Y
     (``^Y'') is the delayed-suspend character.

     All echoing takes place at the remote site, so that (except for delays)
     the rlogin is transparent.  Flow control via ^S/^Q and flushing of input
     and output on interrupts are handled properly.


     Each user may have a private authorization list in the file .klogin in
     their home directory.  Each line in this file should contain a Kerberos
     principal name of the form principal.instance@realm.  If the originating


     rsh(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3)


     The rlogin command appeared in 4.2BSD.


     Rlogin will be replaced by telnet(1) in the near future.

     More of the environment should be propagated.

Linux NetKit (0.17)             August 15, 1999            Linux NetKit (0.17)

The Linux Tutorial is always looking for new contributors.



Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!

Amazon Wish List

Did You Know?
The Linux Tutorial welcomes your suggestions and ideas.


Tell a Friend About Us

Bookmark and Share

Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.10 Seconds