Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain the difference between pid and ppid with example.
Tell me how to discover global zone name from local zone?
How can the output be redirected to some other action process in place showing it in the screen?
How do you remove a swap space?
How do you copy files from remote system using ftp?
How does a solaris cluster work?
how to add Kernel patch in all systems at a time?
How do you break the root password?
Explain the difference between sc> and lom>?
Suppose I have 20 gb free space in my file system but my inode size full. How will I increase or how will I fix this issue?
How can a user boot in solaris as root if the password is non functional?
How many run levels are there and what are they?
What causes the rpc.ttdbserverd process to be cpu bound? How can it be rectified?
Benefits of SMF compared LRC(legacy run control)?
How to solve the system hang issue.