Hi Raju,

Thanx for the infos. Will look into it.

regards
Lohit
>>
>>Ssh supports multiple authentication methods, starting from host-based
>>to key-based.  The most secure is key-based authentication, since only
>>your system holds the key which allows you to login to the ssh server
>>system, and only you have the passphrase which can unlock that key.
>>
>>Have a look at the sshd manual for more information.
>>
>>Regards,
>>


-----------------------------------------------------------------------
Check out the 'What to do before posting to the list' site
for a list of things to try before posting.  The site is
at http://botsie.tripod.com/beforeposting/

Reply via email to