Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain the difference between swap -l & swap -s?
What is difference between swap -l & swap -s?
Suppose I have 20 gb free space in my file system but my inode size full. How will I increase or how will I fix this issue?
What do you understand by mail aliases?
How can threads be created in a solaris environment? Write an example
environment? Is it heterogeneous (mix of linux, solaris,other UNIX)?
What can be a reason for the solaris system slowing down?
How can the user in solaris check the status of processes?
Tell me how to discover global zone name from local zone?
Tell me how many types of file system?
Discuss the two modes of the vi editor in solaris.
What can be a reason for the solaris system slowing down? How can it be rectified?
How does a solaris cluster work?
Explain custom jumpstart procedure?
How can the output be redirected to some other action process in place showing it in the screen?