ssh2
[-l
user] host [commands]ssh2
[options] [user@
]hostSecure shell. This is a secure replacement for the rsh, rlogin, and rcp programs. ssh uses strong public-key encryption technologies to provide end-to-end encryption of data. There may be licensing/patent issues restricting the use of the software in some countries.
Note: ssh2 is not distributed with SVR4 or Solaris. Source code for the noncommercial version for Unix can be downloaded from ftp://ftp.cs.hut.fi/pub/ssh. More information can be found at http://www.ssh.fi and http://www.ipsec.com.