Core router bakeoff?

Dean Anderson dean at av8.com
Fri May 15 04:10:18 UTC 1998


At 4:29 AM -0400 5/14/98, Michael Dillon wrote:
>So what do you do when you're at a conference, your laptop has been stolen
>and the cell phone rings?
>
>If you were using ssh for secure access then the answer would be to find a

It is just as easy to download a kerberized versions of NCSA telnet or
NiftyTelnet, for the mac or pc.  And you don't leave crumbs of host keys
like ssh does.

		--Dean


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
           Plain Aviation, Inc                  dean at av8.com
           LAN/WAN/UNIX/NT/TCPIP/DCE      http://www.av8.com
           We Make IT Fly!                (617)242-3091 x246
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++





More information about the NANOG mailing list