Quick and Easy File Transfer with netrw
The two tools use the classical Linux approach – reading from standard input and writing to standard output – which makes it possible to send the output of a program directly to
netwrite. You can omit the
-o option or redirect the output of the data to appear on the screen of the receiving computer (Figure 5).
If you do not specify an input file or an output file,
netwrite reads from the standard input and displays on the standard output. You can use this to build a makeshift chat tool (Figure 6).
If you intend to use this tool over a route outside of your private network, you'll want to secure the communication using Secure Shell (SSH). You need one terminal each for transmitting and receiving. Additionally, you must use a separate port for each direction.
The netrw tools make it easy to transfer data between two computers. They do not rely on any intermediate infrastructure and work practically on demand. And, if you encrypt the payload, you will always be on the safe side when transmitting data.
- Netrw: http://mamuti.net/netrw/index.en.html
- Code for this article: ftp://ftp.linux-magazin.com/pub/listings/magazine/163
- Stat (Coreutils): http://www.gnu.org/software/coreutils/
- Zenity: https://wiki.gnome.org/action/show/Projects/Zenity?action=show&redirect=Zenity
- Cdialog: http://freecode.com/projects/cdialog
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm