P. 1
Red Hat - Linux 9 Customization Guide

Red Hat - Linux 9 Customization Guide

5.0

|Views: 725|Likes:
Publicado porGeorge
This document contains information on how to customize your RHL system to fit your needs.
This document contains information on how to customize your RHL system to fit your needs.

More info:

Published by: George on Aug 17, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/14/2012

pdf

text

original

If you use OpenSSH tools, you are enhancing the security of your machine. All communications using
OpenSSH tools, including passwords, are encrypted. Telnet and ftp use plain text passwords and
send all information unencrypted. The information can be intercepted, the passwords can be retrieved,
and then your system can be compromised by an unauthorized person logging in to your system using
one of the intercepted passwords. The OpenSSH set of utilities should be used whenever possible to
avoid these security problems.

Another reason to use OpenSSH is that it automatically forwards the DISPLAY variable to the client
machine. In other words, if you are running the X Window System on your local machine, and you
log in to a remote machine using the ssh command, when you run a program on the remote machine
that requires X, it will be displayed on your local machine. This feature is convenient if you prefer
graphical system administration tools but do not always have physical access to your server.

You're Reading a Free Preview

Descarga
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->