This is another area where unix in general has to catch up with windows. On windows, challenge-response authentication is norm since NT SP3 days and on Linux most installations (and most distributions) have still not made it a default when there are at least half a dozen well-known ways of setting it up.
Using pam-authentication to a source that does not need your pw is the simplest, if you have any control over your server. However, if you are really worried about somebody snooping on your data on a public network, this is only a partial help as your email will still probably come unencrypted. Try setting up some kind of VPN or ssh/ssl tunnel to your host. Ask for help if you need any for that. With Warm Regards Tarun Upadhyay Induslogic Inc. 4th Floor, Picadilly House 276, Capt Gaur Marg, Srinivaspuri Delhi 110065, India. P: +91.11.5170.9070 x 5353 F: +91.11.5170.9071 C: +91.9811.535353 E: [EMAIL PROTECTED] www.induslogic.com > -----Original Message----- > From: > [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] > i.org] On Behalf Of Robins Tharakan > Sent: Sunday, August 17, 2003 3:46 PM > To: Linux-Delhi > Subject: [ilugd] pop on public network > > hi, > > > i just did a tcpdump on the local cable wallah network, and > realised that anyone with a tcpdump -i eth1 -w file.dump can > easily see my pop username/pwd .... > > is there any way out? or is this the reason why tcpdump is so > dear a tool??? > > "help" > > affly > rbs > > > _______________________________________________ > ilugd mailing list > [EMAIL PROTECTED] > http://frodo.hserus.net/mailman/listinfo/ilugd > _______________________________________________ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd