Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are nfs daemons?
What are the raid levels in solaris?
Explain the difference between swap -l & swap -s?
In solaris 10 root Disk is 98% full what steps to be taken?
environment? Is it heterogeneous (mix of linux, solaris,other UNIX)?
What are the ways in which replication agreements between directory structures be arranged?
what is the importance of swap memory and how it will supports?
Tell me how to solve the system hung issue. Found that the memory state is free, commands to check and solve the issue?
Tell me how to mount the floppy & cd-rom?
Suppose I have 20 gb free space in my file system but my inode size full. How will I increase or how will I fix this issue?
How can searches be refined?
How can a user boot in solaris as root if the password is non functional?
What is the login shell?
1.Have you used vxboot ? 2.Minimum requirement for mirror volume to created ?
How to solve the system hang issue. Found that the memory state is free, commands to check and solve the issue?