X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=doc%2Fintro.but;h=ab9b04e4df10d82f917d3273cd0db47d63baab24;hb=550f7b37cb7dbe0dcd68d2ac2c3b529e643599b3;hp=9e2767dc2a88f0181d1cc017be5eabdc92b4c2fc;hpb=6cb3f43704da78c9377ca047811d478cedf24167;p=PuTTY.git diff --git a/doc/intro.but b/doc/intro.but index 9e2767dc..ab9b04e4 100644 --- a/doc/intro.but +++ b/doc/intro.but @@ -1,4 +1,4 @@ -\versionid $Id: intro.but,v 1.6 2004/06/15 11:00:28 jacob Exp $ +\define{versionidintro} \versionid $Id$ \C{intro} Introduction to PuTTY @@ -66,14 +66,6 @@ high-security protocol. It uses strong cryptography to protect your connection against eavesdropping, hijacking and other attacks. Telnet and Rlogin are both older protocols offering minimal security. -\b Telnet allows you to pass some settings on to the server, such as -environment variables. (These control various aspects of the -server's behaviour. You can usually set them by entering commands -into the server once you're connected, but it's easier to have -Telnet do it automatically.) SSH and Rlogin do not support this. -However, most modern Telnet servers don't allow it either, because -it has been a constant source of security problems. - \b SSH and Rlogin both allow you to log in to the server without having to type a password. (Rlogin's method of doing this is insecure, and can allow an attacker to access your account on the