j
k
j a
j l
...without the protection against eavesdropping, injection or modification given by SSH. Session Hijacking is also possible with the data connection.
without the protection against eavesdropping, injection or modification given by SSH.
Session Hijacking is also possible with the data connection.
Which means that data can be injected and/or modifed, no? ;-) Nice weekend, y'all. Tobias
Back to the thread
Back to the list