James,
I appreciate all the nice feedback that you have provided to my question...
 
Harjit

        -----Original Message----- 
        From: Singh, Harjit (Mission Systems) 
        Sent: Wed 3/30/2005 12:30 PM 
        To: James Weatherall; 'Erik Soderquist'; [email protected] 
        Cc: 
        Subject: RE: Question
        
        
        James,
        I dont understand the context of your comment.  But I have to look into 
all security features built into the tool. 
         
        Harjit

                -----Original Message----- 
                From: James Weatherall [mailto:[EMAIL PROTECTED] 
                Sent: Wed 3/30/2005 12:22 PM 
                To: Singh, Harjit (Mission Systems); 'Erik Soderquist'; 
[email protected] 
                Cc: 
                Subject: RE: Question
                
                

                Harjit, 

                Why do you ask? 

                Cheers, 

                Wez @ RealVNC Ltd. 
                  

                > -----Original Message----- 
                > From: Singh, Harjit (Mission Systems) [mailto:[EMAIL 
PROTECTED] 
                > Sent: 30 March 2005 18:17 
                > To: Erik Soderquist; James Weatherall; [email protected] 
                > Subject: RE: Question 
                > 
                > Eric, 
                > Assuming encryption is used, is step three encryption link 
                > the same as in step 5 encryption or the encryption link is 
                > negotiated again for step 5. 
                >  
                > Harjit Singh 
                > 
                >       -----Original Message----- 
                >       From: Erik Soderquist [mailto:[EMAIL PROTECTED] 
                >       Sent: Wed 3/30/2005 10:37 AM 
                >       To: James Weatherall; Singh, Harjit (Mission Systems); 
                > [email protected] 
                >       Cc: 
                >       Subject: RE: Question 
                >       
                >       
                > 
                >       I think this is the idea that is being sought: 
                >       
                >       step 1.) tcp connection established 
                >       step 2.) authentication method selected/negotiated 
                >       step 3.) encrypted channel opened 
                >       step 4.) authentication occurs 
                >       step 5.) session proceeds (with or without encryption, 
                > depending on 
                >       settings) 
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to