Hi Raju,
Thanx for the infos. Will look into it.
regards
Lohit
>>
>>Ssh supports multiple authentication methods, starting from host-based
>>to key-based. The most secure is key-based authentication, since only
>>your system holds the key which allows you to login to the ssh server
>>system, and only you have the passphrase which can unlock that key.
>>
>>Have a look at the sshd manual for more information.
>>
>>Regards,
>>
-----------------------------------------------------------------------
Check out the 'What to do before posting to the list' site
for a list of things to try before posting. The site is
at http://botsie.tripod.com/beforeposting/