Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
environment? Is it heterogeneous (mix of linux, solaris,other UNIX)?
How can a user login to solaris? What is the login shell?
How can searches be refined?
Tell me how to set the path for core file?
What causes the rpc.ttdbserverd process to be cpu bound? How can it be rectified?
What is the login shell?
List out a few performance monitoring tools.
Tell me how to solve the system hung issue. Found that the memory state is free, commands to check and solve the issue?
Tell me how to mount the floppy & cd-rom?
How do you remove a swap space?
Explain the difference between svm and vxvm?
How can threads be created in a solaris environment?
What are nfs daemons?
Explain the types of installations in solaris
How many run levels are there and what are they?