At 11/8/2001 05:13 AM -0800, you wrote: >While I agree that useing SSH over an open network is the way to go, on a >closed network, >telnet is just fine.
By some sources, over 80% of attacks, thefts, sabotages, etc. are internal. By my own consulting practices, a *huge* percentage of problems are internally-caused. In kidnapping cases, 95% of attackers had inside information. In divorce cases where money is an issue, in over 85% of cases one spouse is spying or stealing information from the other. Yes, you can do it. But really, if SSH works just as well out-of-the-box and is just as simple, why would you? Heck, on my internal network SSH is much *easier*. I set up the right keys, and now I type one password when logging in then get access to everything, properly authenticated, transparently. Just because a thing *can* be done is often no reason to do it. -- Rodolfo J. Paiz [EMAIL PROTECTED] _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list