Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Jul 1998 11:40:47 -0600
From:      Nate Williams <nate@mt.sri.com>
To:        sthaug@nethelp.no
Cc:        nate@mt.sri.com, security@FreeBSD.ORG
Subject:   Re: FreeBSD Security How-To (Was: QPopper exploit)
Message-ID:  <199807291740.LAA27824@mt.sri.com>
In-Reply-To: <2791.901733838@verdi.nethelp.no>
References:  <199807291532.JAA26878@mt.sri.com> <2791.901733838@verdi.nethelp.no>

next in thread | previous in thread | raw e-mail | index | archive | help
> > > For a 30 day trial copy, go to www.datafellows.com and hed to their
> > > download section. You can get a m$ copy of ssh client there.
> > 
> > We bought a half dozen of these, and all I can say is they're buggier
> > than snot.  Compression doesn't work if turned on, it hogs all the CPU
> > on the machine (but does nothing) much of the time, and crashes the box
> > occasionally.
> 
> Different experiences, evidently. We have several users here who use the
> Windows version all the time, and they seem happy enough. Tunnelling pop3
> through ssh works on the windows client too...

Try using the client with something bigger than a few K of data (say a
couple of megabytes) and it'll wipe out the box.


Nate

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199807291740.LAA27824>