1. NAME▲
tkconch - connect to SSH servers graphically
2. SYNOPSIS ▲
conch [-l user] [-i identity [ -i identity ... ]] [-c cipher] [-m MAC] [-p port] [-n] [-t] [-T] [-V] [-C] [-N] [-s] [arg [...]]
conch --help
3. DESCRIPTION ▲
The --help prints out a usage message to standard output.
- -l, --user <user>
Log in using this user name. - -e, --escape <escape character>
Set escape character; 'none' = disable (default: ~) - -i, --identity <identity>
Add an identity file for public key authentication (default: ~/.ssh/identity) - -c, --cipher <cipher>
Cipher algorithm to use. - -m, --macs <mac>
Specify MAC algorithms for protocol version 2. - -p, --port <port>
Port to connect to. - -L, --localforward <listen-port:host:port>
Forward local port to remote address. - -R, --remoteforward <listen-port:host:port>
Forward remote port to local address. - -t, --tty
Allocate a tty even if command is given. - -n, --notty
Do not allocate a tty. - -V, --version
Display version number only. - -C, --compress
Enable compression. - -a, --ansilog
Print the received data to stdout. - -N, --noshell
Do not execute a shell or command. - -s, --subsystem
Invoke command (mandatory) as SSH2 subsystem. - --log
Print the receieved data to stderr.
4. DESCRIPTION ▲
Open an SSH connection to specified server, and either run the command given there or open a remote interactive shell.
5. AUTHOR ▲
Written by Moshe Zadka, based on conch's help messages
6. REPORTING BUGS ▲
To report a bug, visit http://twistedmatrix.com/bugs/
7. COPYRIGHT ▲
Copyright © 2002-2008 Twisted Matrix Laboratories.
This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
8. SEE ALSO ▲
ssh(1)