X-Git-Url: https://git.distorted.org.uk/~mdw/sgt/putty/blobdiff_plain/882fa14867e45dbfe681dd50cc2d70a28f2efeca..690695e0356273fb6aa1c851713831f14254590d:/doc/intro.but diff --git a/doc/intro.but b/doc/intro.but index 9e2767dc..ab9b04e4 100644 --- a/doc/intro.but +++ b/doc/intro.but @@ -1,4 +1,4 @@ -\versionid $Id: intro.but,v 1.6 2004/06/15 11:00:28 jacob Exp $ +\define{versionidintro} \versionid $Id$ \C{intro} Introduction to PuTTY @@ -66,14 +66,6 @@ high-security protocol. It uses strong cryptography to protect your connection against eavesdropping, hijacking and other attacks. Telnet and Rlogin are both older protocols offering minimal security. -\b Telnet allows you to pass some settings on to the server, such as -environment variables. (These control various aspects of the -server's behaviour. You can usually set them by entering commands -into the server once you're connected, but it's easier to have -Telnet do it automatically.) SSH and Rlogin do not support this. -However, most modern Telnet servers don't allow it either, because -it has been a constant source of security problems. - \b SSH and Rlogin both allow you to log in to the server without having to type a password. (Rlogin's method of doing this is insecure, and can allow an attacker to access your account on the