Answer Posted / srinivas
connecting through telnet or ftp or rsh to the remote
system the data will be transfered in an decrypted manner a
hacker can know the information through snoop command where
as if we connect through SSH the data will be transfered in
an encrypted form so that the hacker has no chance to hack
the password.
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Explain the difference between sc> and lom>?
How do you remove a swap space?
How does a solaris cluster work?
What kind of issues you get?
Explain the difference between svm and vxvm?
How do you break the root password?
1.Have you used vxboot ? 2.Minimum requirement for mirror volume to created ?
How can the output be redirected to some other action process in place showing it in the screen?
Explain the vmstat output?
Explain how to view shared memory statistics?
List out a few performance monitoring tools.
How can a user increase the number of pseudo-ttys? what is their use?
Benefits of SMF compared LRC(legacy run control)?
Suppose I have 20 gb free space in my file system but my inode size full. How will I increase or how will I fix this issue?
What do you understand by mail aliases?