.TH CONCH "1" "October 2002" "" "" .SH NAME tkconch \- connect to SSH servers graphically .SH SYNOPSIS .B conch [-l \fIuser\fR] [-i \fIidentity\fR [ -i \fIidentity\fR ... ]] [-c \fIcipher\fR] [-m \fIMAC\fR] [-p \fIport\fR] [-n] [-t] [-T] [-V] [-C] [-N] [-s] [arg [...]] .PP .B conch --help .SH DESCRIPTION .PP The \fB\--help\fR prints out a usage message to standard output. .TP \fB-t\fR, \fB--user\fR <user> User name to use .TP \fB-i\fR, \fB--identity\fR <identity> Add an identity file. .TP \fB-c\fR, \fB--cipher\fR <cipher> Cipher algorithm to use. .TP \fB-m\fR, \fB--macs\fR <mac> Specify MAC algorithms for protocol version 2. .TP \fB-p\fR, \fB--port\fR <port> Port to connect to. .TP \fB-n\fR, \fB--null\fR Redirect input from /dev/null .TP \fB-t\fR, \fB--tty\fR Allocate a tty even if command is given. .TP \fB-n\fR, \fB--notty\fR Do not allocate a tty. .TP \fB-V\fR, \fB--version\fR Display version number only. .TP \fB-C\fR, \fB--compress\fR nable compression. .TP \fB-N\fR, \fB--noshell\fR Do not execute a shell or command. .TP \fB-s\fR, \fB--subsystem\fR Invoke command (mandatory) as SSH2 subsystem .TP \fB--log\fR Log to stderr .SH DESCRIPTION Open an SSH connection to specified server, and either run the command given there or open a remote interactive shell. .SH AUTHOR Written by Moshe Zadka, based on conch's help messages .SH "REPORTING BUGS" Report bugs to <twisted-python@twistedmatrix.com>. .SH COPYRIGHT Copyright \(co 2002 Matthew W. Lefkowitz .br This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. .SH "SEE ALSO" ssh(1)