rwho - definição. O que é rwho. Significado, conceito
Diclib.com
Dicionário ChatGPT
Digite uma palavra ou frase em qualquer idioma 👆
Idioma:

Tradução e análise de palavras por inteligência artificial ChatGPT

Nesta página você pode obter uma análise detalhada de uma palavra ou frase, produzida usando a melhor tecnologia de inteligência artificial até o momento:

  • como a palavra é usada
  • frequência de uso
  • é usado com mais frequência na fala oral ou escrita
  • opções de tradução de palavras
  • exemplos de uso (várias frases com tradução)
  • etimologia

O que (quem) é rwho - definição

SUITE OF REMOTE-ACCESS UTILITIES
Rcp (Unix); Slogin; Remote Process Execution; Rexec; Rlogin; Rwho

rwho         
<networking> The Berkeley Unix networking command to report who is logged in on all hosts on the local {network segment}. Unix manual page: rwho(1). (1996-09-08)
rlogin         
<networking, tool> (Remote login) The 4.2BSD Unix utility to allow a user to log in on another host via a network. Rlogin communicates with a daemon on the remote host. Unix manual page: rlogin(1). See also telnet. (1997-01-12)

Wikipédia

Berkeley r-commands

The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network. The r-commands were developed in 1982 by the Computer Systems Research Group at the University of California, Berkeley, based on an early implementation of TCP/IP (the protocol stack of the Internet).

The CSRG incorporated the r-commands into their Unix operating system, the Berkeley Software Distribution (BSD). The r-commands premiered in BSD v4.1. Among the programs in the suite are: rcp (remote copy), rexec (remote execution), rlogin (remote login), rsh (remote shell), rstat, ruptime, and rwho (remote who).

The r-commands were a significant innovation, and became de facto standards for Unix operating systems. With wider public adoption of the Internet, their inherent security vulnerabilities became a problem, and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment and use of r-commands (and Telnet) on networked systems.