James,
I dont understand the context of your comment.  But I have to look into all 
security features built into the tool. 
 
Harjit

        -----Original Message----- 
        From: James Weatherall [mailto:[EMAIL PROTECTED] 
        Sent: Wed 3/30/2005 12:22 PM 
        To: Singh, Harjit (Mission Systems); 'Erik Soderquist'; 
[email protected] 
        Cc: 
        Subject: RE: Question
        
        

        Harjit, 

        Why do you ask? 

        Cheers, 

        Wez @ RealVNC Ltd. 
          

        > -----Original Message----- 
        > From: Singh, Harjit (Mission Systems) [mailto:[EMAIL PROTECTED] 
        > Sent: 30 March 2005 18:17 
        > To: Erik Soderquist; James Weatherall; [email protected] 
        > Subject: RE: Question 
        > 
        > Eric, 
        > Assuming encryption is used, is step three encryption link 
        > the same as in step 5 encryption or the encryption link is 
        > negotiated again for step 5. 
        >  
        > Harjit Singh 
        > 
        >       -----Original Message----- 
        >       From: Erik Soderquist [mailto:[EMAIL PROTECTED] 
        >       Sent: Wed 3/30/2005 10:37 AM 
        >       To: James Weatherall; Singh, Harjit (Mission Systems); 
        > [email protected] 
        >       Cc: 
        >       Subject: RE: Question 
        >       
        >       
        > 
        >       I think this is the idea that is being sought: 
        >       
        >       step 1.) tcp connection established 
        >       step 2.) authentication method selected/negotiated 
        >       step 3.) encrypted channel opened 
        >       step 4.) authentication occurs 
        >       step 5.) session proceeds (with or without encryption, 
        > depending on 
        >       settings) 
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to