ACPI administration advocacy advocacy advocacy opinion alsa amarok apache apple apt aptitude archive audio audo authentication automount avi awk backup bash BIOS boot browser business bzip cache calendar calibre cdr cdrecord censorship commandline computerscience console convert cron cut database date debian degree design desktop development disk dpkg dvd economics education emacs email europe exim faad ffmpeg file files firefox firewall flash foss freedom ftp fun fuse git gnumeric graphics grep growisofs grub gtkpod gzip hardware hardware html icedove idiocy image imagemagick images installation ip iphone ipod iptables iso itunes ivman kde kernel keyboard knoppix lame laptop latex libreoffice linux locale lockin locking longlines lsof m4a microsoft mimetypes minitab mogrify mount mp3 mp4 mplayer multimedia music mysql network nfs nfs4 nmap openbox openfiles openoffice opinion opinion orgmode partition pdf pdftk perl php podcast politics pomodoro ports postgresql print printing privacy process programming rant remote rhythmbox rss rsync rxvt scp screengrab screenshot script scripting scsi security sed server services shell siteadmin sitenews sitesoftware skype skype slackware sound sox spam spreadsheet ssh statistics subversion sudo svk swap t23 t43 tar terminal tex text thinkpad thunderbird time timer timezone ubuntu udev upgrade usb usbmount users uuid versioncontrol vfat video vnc windows wine wordpress wordprocessing X40 xwindows xwindows youtube
Being able to run progams on remote computers is something that is being hyped at the moment as consultants push web services. However, unix systems and Linux have had this capability for a long time.
Of course, opening up another machine to accept remote commands represents a security risk. These days, it is possible and far safer to run any programs through the secure shell server (sshd) on the host on which you want to run the programs. To do you'll need the ssh client program on the client machine. "rsh", the command that allows running remote programs, comes as part of any secure shell distribution.
rsh allows simple shell commands to be executed. For example:
rsh firstname.lastname@example.org ls
At this stage, you will, probably be asked for a password. Then you'll get a listing of the home directory of user1 on somehost.tld.
One of the most useful uses of rsh is when it is invoked by tar, the archiving program. So,
tar cjf email@example.com:backup.tar.bz2 ~
will create a a file called 'backup.tar.bz2' in the home directory of user1 on otherhost.tld, containing my home directory tree.