From owner-freebsd-questions@FreeBSD.ORG Fri Jan 8 12:50:11 2010 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A6D16106566C for ; Fri, 8 Jan 2010 12:50:11 +0000 (UTC) (envelope-from carmel_ny@hotmail.com) Received: from blu0-omc4-s22.blu0.hotmail.com (blu0-omc4-s22.blu0.hotmail.com [65.55.111.161]) by mx1.freebsd.org (Postfix) with ESMTP id 6D2DB8FC12 for ; Fri, 8 Jan 2010 12:50:11 +0000 (UTC) Received: from BLU0-SMTP65 ([65.55.111.136]) by blu0-omc4-s22.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 8 Jan 2010 04:50:11 -0800 X-Originating-IP: [67.189.160.65] X-Originating-Email: [carmel_ny@hotmail.com] Message-ID: Received: from [192.168.1.102] ([67.189.160.65]) by BLU0-SMTP65.blu0.hotmail.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 8 Jan 2010 04:50:10 -0800 Date: Fri, 08 Jan 2010 07:50:10 -0500 From: Carmel To: freebsd-questions@freebsd.org Organization: seibercom.net X-Face: %w26Xx*^+moP{$gQJ3pY@y!8g&-n%/zKp; aE#\*zy9L1X$QU7)|K"# QM:ob~"(eWt{P?#Ec; |v]#G"{{WZF-rt\4n1IS3I[w>Z MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Mailer: Becky! ver. 2.52.03 [en] X-OriginalArrivalTime: 08 Jan 2010 12:50:10.0545 (UTC) FILETIME=[1CF3D610:01CA9061] X-Mailman-Approved-At: Fri, 08 Jan 2010 12:56:04 +0000 Subject: Accessing Computer X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: freebsd-questions@freebsd.org List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Jan 2010 12:50:11 -0000 Assume three computers. Computer 1 runs Windows with Putty installed Computer 2 & 3 run FreeBSD Computer 1 runs Putty and creates a key that is installed on computer 2. Computer 2 has a key that is installed on computer 3. If someone were to use computer 1 via Putty to access computer 2, would they then be able to access computer 3? If so, how could I prevent it from happening? I am not good at explaining things, so I hope you understand what I am referring to. -- Carmel carmel@hotmail.com For every complex problem there is an answer that is clear, simple, and wrong. Mencken, H. L.