At 11/8/2001 05:13 AM -0800, you wrote:
>While I agree that useing SSH over an open network is the way to go, on a 
>closed network,
>telnet is just fine.

By some sources, over 80% of attacks, thefts, sabotages, etc. are internal.

By my own consulting practices, a *huge* percentage of problems are 
internally-caused.

In kidnapping cases, 95% of attackers had inside information.

In divorce cases where money is an issue, in over 85% of cases one spouse 
is spying or stealing information from the other.

Yes, you can do it. But really, if SSH works just as well out-of-the-box 
and is just as simple, why would you?

Heck, on my internal network SSH is much *easier*. I set up the right keys, 
and now I type one password when logging in then get access to everything, 
properly authenticated, transparently.

Just because a thing *can* be done is often no reason to do it.


--
Rodolfo J. Paiz
[EMAIL PROTECTED]



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to