As illustrated in Chapter 7, "Sniffers and Electronic Eavesdropping," many network services (including but not limited to
rexec) are vulnerable to electronic eavesdropping. This presents a major problem because even in a closed network environment, at bare minimum you must have secure means of moving files, setting permissions, running shell scripts, and so on.
To guard against attackers capturing your day-to-day network traffic, I highly recommend that you install Secure Shell (
ssh). This chapter illustrates how to install and use the
ssh server and client utilities.
Secure Shell is a secure login system and suitable replacement for