Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain the difference between sc> and lom>?
How do you break the root password?
Performace degradations in NFSv4 when upgraded from NFSv3? problems with NFS v4?
Discuss the two modes of the vi editor in solaris.
How to solve the system hang issue.
What are nfs daemons?
How can abiword be compiled for solaris using gcc?
How do you copy files from remote system using ftp?
What is the login shell?
How can the output be redirected to some other action process in place showing it in the screen?
How can a user login to another system on his network remotely?
List out a few performance monitoring tools.
How can a user login to solaris?
What are nis daemons?
How can a user login to solaris? What is the login shell?