X-Git-Url: https://git.distorted.org.uk/u/mdw/putty/blobdiff_plain/6cc170f02be245cb3269b2512f9e8a9373cc0c55..d46a9154e9a0e15f9e4561a1f7f563e21f211208:/doc/intro.but diff --git a/doc/intro.but b/doc/intro.but index c8d60d45..ab9b04e4 100644 --- a/doc/intro.but +++ b/doc/intro.but @@ -1,4 +1,4 @@ -\versionid $Id: intro.but,v 1.5 2004/04/08 12:38:53 simon Exp $ +\define{versionidintro} \versionid $Id$ \C{intro} Introduction to PuTTY @@ -61,18 +61,10 @@ remote login protocols. This list summarises some of the \i{differences between SSH, Telnet and Rlogin}. -\b SSH is a recently designed, high-security protocol. It uses -strong cryptography to protect your connection against -eavesdropping, hijacking and other attacks. Telnet and Rlogin are -both older protocols offering minimal security. - -\b Telnet allows you to pass some settings on to the server, such as -environment variables. (These control various aspects of the -server's behaviour. You can usually set them by entering commands -into the server once you're connected, but it's easier to have -Telnet do it automatically.) SSH and Rlogin do not support this. -However, most modern Telnet servers don't allow it either, because -it has been a constant source of security problems. +\b SSH (which stands for \q{\i{secure shell}}) is a recently designed, +high-security protocol. It uses strong cryptography to protect your +connection against eavesdropping, hijacking and other attacks. Telnet +and Rlogin are both older protocols offering minimal security. \b SSH and Rlogin both allow you to log in to the server without having to type a password. (Rlogin's method of doing this is