Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Discuss the two modes of the vi editor in solaris.
How can a user login to another system on his network remotely?
How can a user access a dos-format disk in solaris?
1.Have you used vxboot ? 2.Minimum requirement for mirror volume to created ?
How does a solaris cluster work?
How do you break the root password?
What causes the rpc.ttdbserverd process to be cpu bound?
Explain what is multi homed system?
Explain the types of installations in solaris
How do you remove a swap space?
What kind of issues you get?
How can abiword be compiled for solaris using gcc?
How can a user increase the number of pseudo-ttys? what is their use?
what is the importance of swap memory and how it will supports?
Benefits of SMF compared LRC(legacy run control)?