POP, SMTP and other such protocols are text based without any encryption. Anyone sitting on the gateway can go on sniffing passwords. Till about some years back, even yahoo messenger had its passwords sent out in clear text !! An alternative could be using POP over SSL but the provider needs to support this. Also you could use POP over an SSH connection but for that too you need to have sshd on the server. There are other options like APOP, KPOP and IMAP, try these out.
-js -------------------------------------------------------------- sometimes i'm good but when i'm bad i'm even better $ -----Original Message----- $ From: [EMAIL PROTECTED] $ [mailto:[EMAIL PROTECTED] $ g] On Behalf Of Robins Tharakan $ Sent: Monday, August 18, 2003 1:16 AM $ To: Linux-Delhi $ Subject: [ilugd] pop on public network $ $ $ hi, $ $ $ i just did a tcpdump on the local cable wallah network, and $ realised that anyone with a $ tcpdump -i eth1 -w file.dump $ can easily see my pop username/pwd .... $ $ is there any way out? or is this the reason why tcpdump is so $ dear a tool??? $ $ "help" $ $ affly $ rbs $ $ $ _______________________________________________ $ ilugd mailing list $ [EMAIL PROTECTED] $ http://frodo.hserus.net/mailman/listinfo/ilugd $ _______________________________________________ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
