15 May
1998
15 May
'98
12:10 a.m.
At 4:29 AM -0400 5/14/98, Michael Dillon wrote:
So what do you do when you're at a conference, your laptop has been stolen and the cell phone rings?
If you were using ssh for secure access then the answer would be to find a
It is just as easy to download a kerberized versions of NCSA telnet or NiftyTelnet, for the mac or pc. And you don't leave crumbs of host keys like ssh does. --Dean ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Plain Aviation, Inc dean@av8.com LAN/WAN/UNIX/NT/TCPIP/DCE http://www.av8.com We Make IT Fly! (617)242-3091 x246 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++