> Ah!, i see, now i understand, the penny did not drop
> when i read your first
> mail. I have never used any program like that
> because i was taught never to
> use programs which invite the unworthy in, what you
> are doing is inviting
> the world into your machine.

It is not like that at all!!!
The following is what I understand by .rhosts:
The 'worthy' are selected beforehand on basis of
trust. Noone else can access the machine.  This file
(.rhosts) does not open the machine to the rest of the
world!  It only enables those individuals, whose
userIDs are present in the local system, to access the
machine from remote hosts specified, skipping the
password stage when logging in.  In other words, if
you don't have an account on my machine, you are
banned from access "even if you say 'please'".
I am not crazy enough to let anyone know the root
password, but for the users with limited set of
permissions this should work fine.
 
> 
> Whats easier than typing;
> 
> Welcome to Linux 2.2.13
> 
> Ronald Login: User <enter>
> Password: MyPassword <enter>
> 
> Ronald:~$
> 


=====
<|>
Eugene
__________________________________________________
Do You Yahoo!?
Thousands of Stores.  Millions of Products.  All in one place.
Yahoo! Shopping: http://shopping.yahoo.com

Reply via email to