Execute command on remote host, or, if no command is specified, begin an interactive shell on the remote host using rlogin. The options can be specified before or after host. Use of rsh has generally been replaced with ssh, which offers better security.
Enable socket debugging.
Forward nonforwardable Kerberos credentials to the remote machine and remove them after the command completes. -f and -F are mutually exclusive.
Forward forwardable Kerberos credentials to the remote machine and remove them after the command completes. -f and -F are mutually exclusive.
Use the specified realm to obtain tickets for the remote host. By default, the rsh command gets the information from the function krb_realmofhost(3).
Attempt to log in as username. By default, the name of the user executing rsh is used.
Redirect the input to rsh from the special device /dev/null. (This should be done when backgrounding rsh from a shell prompt, to direct the input away from the terminal.)
Request the new or old Kerberos rcmd protocol, respectively.
Encrypt the network session traffic (except the command line).