Core router bakeoff?
Dean Anderson
dean at av8.com
Fri May 15 04:10:18 UTC 1998
At 4:29 AM -0400 5/14/98, Michael Dillon wrote:
>So what do you do when you're at a conference, your laptop has been stolen
>and the cell phone rings?
>
>If you were using ssh for secure access then the answer would be to find a
It is just as easy to download a kerberized versions of NCSA telnet or
NiftyTelnet, for the mac or pc. And you don't leave crumbs of host keys
like ssh does.
--Dean
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Plain Aviation, Inc dean at av8.com
LAN/WAN/UNIX/NT/TCPIP/DCE http://www.av8.com
We Make IT Fly! (617)242-3091 x246
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
More information about the NANOG
mailing list