10.4.1. Introduction
There are a couple of different ways to execute commands or run
programs on a remote machine and have the output, be it text or
graphics, sent to your workstation. The connections can be secure
or insecure. While it is of course advised to use secure
connections instead of transporting your password over the network
unencrypted, we will discuss some practical applications of the
older (unsafe) mechanisms, as they are still useful in a modern
networked environment, such as for troubleshooting or running
exotic programs.