From owner-freebsd-security Tue Jul 25 10:23: 9 2000 Delivered-To: freebsd-security@freebsd.org Received: from federation.addy.com (federation.addy.com [208.11.142.20]) by hub.freebsd.org (Postfix) with ESMTP id 787B237BED2 for ; Tue, 25 Jul 2000 10:23:03 -0700 (PDT) (envelope-from jim@federation.addy.com) Received: from localhost (jim@localhost) by federation.addy.com (8.9.3/8.9.3) with ESMTP id NAA29523 for ; Tue, 25 Jul 2000 13:22:57 -0400 (EDT) (envelope-from jim@federation.addy.com) Date: Tue, 25 Jul 2000 13:22:57 -0400 (EDT) From: Jim Sander Cc: freebsd-security@FreeBSD.ORG Subject: Re: allow access of root user In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > there are some Java applet ssh clients out there now. Have been for a long while. (1+ years at least) Here's one that I bookmarked a while ago, although there are several others I've seen that gave mixed results... http://www.cl.cam.ac.uk/~fapp2/software/java-ssh/ Personally, I distrust JAVA-based clients since you really have no way of knowing that they're not retransmitting your host/user/pass to an unscrupulous listener. But of course there's no stopping SecureCRT from doing the same thing except their good reputation. -=Jim=- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message