Mark,
This is interesting- it points to a missing part of my description of
the situation. I guess this would be called the "security model" of
this situation: what is trusted and what is not trusted.
In this situation, the commands (running as "administrator) executed by
SSH on behalf of the re
We would like to use a Cgywin-based OpenSSH implementation
(http://lexa.mckenna.edu/sshwindows/)
for running tasks remotely on Windows (2000, XP) systems. The systems
involved would have this
OpenSSH distribution installed on them, but not a full Cygwin distribution.
The security issue
of non-admi
2 matches
Mail list logo