>> use rsh and .rhosts :) > > I do that already, not really what I call secure ;) Could you please explain why it is not secure in your case? I don't know exactly the environment in your case so i can't answer for sure, but most probably it's perfectly secure.