On Fri, 2013-03-22 at 22:12 +0100, Reindl Harald wrote:
>
> Am 22.03.2013 22:06, schrieb Aaron Konstam:
> > How do you get rshd to run?
>
> hopefully not at all
>
> the rsh protocol is not secure for network use, because it
> sends unencrypted information over the network
>
> > How are the .r
Am 22.03.2013 22:06, schrieb Aaron Konstam:
> How do you get rshd to run?
hopefully not at all
the rsh protocol is not secure for network use, because it
sends unencrypted information over the network
> How are the .rhosts files created along the way?
what about ssh / scp / rsync with key-a
How do you get rshd to run? How are the .rhosts files created along the
way?
--
===
ignorance, n.: When you don't know anything, and someone else finds out.
===