How do you get rshd to run? How are the .rhosts files created along the way?
Am 22.03.2013 22:06, schrieb Aaron Konstam:
How do you get rshd to run?
hopefully not at all
the rsh protocol is not secure for network use, because it sends unencrypted information over the network
How are the .rhosts files created along the way?
what about ssh / scp / rsync with key-auth? there is no reason to use unsecure services
On Fri, 2013-03-22 at 22:12 +0100, Reindl Harald wrote:
Am 22.03.2013 22:06, schrieb Aaron Konstam:
How do you get rshd to run?
hopefully not at all
the rsh protocol is not secure for network use, because it sends unencrypted information over the network
How are the .rhosts files created along the way?
what about ssh / scp / rsync with key-auth? there is no reason to use unsecure services
Well I finally used rsync.