4.6. Summary
SSH1, SSH2, F-Secure SSH Server, and OpenSSH may all be tailored in
various ways by compile-time configuration with the
configure script. We've covered the
SSH-specific flags, but remember that other operating system-specific
flags may also apply to your installation, so be sure to read the
installation notes supplied with the software.
Once installed, SSH software may replace the insecure r-commands on
your Unix system, not only when run directly, but also within other
programs that invoke
rsh, such as Emacs and Pine.
![Previous](../gifs/txtpreva.gif) | ![Home](../gifs/txthome.gif) | ![Next](../gifs/txtnexta.gif) |
4.5. Replacing R-Commands with SSH | ![Book Index](../gifs/index.gif) | 5. Serverwide Configuration |