This is another area where unix in general has to catch up with windows.

On windows, challenge-response authentication is norm since NT SP3 days and
on Linux most installations (and most distributions) have still not made it
a default when there are at least half a dozen well-known ways of setting it
up.

Using pam-authentication to a source that does not need your pw is the
simplest, if you have any control over your server. 

However, if you are really worried about somebody snooping on your data on a
public network, this is only a partial help as your email will still
probably come unencrypted.
Try setting up some kind of VPN or ssh/ssl tunnel to your host.

Ask for help if you need any for that.

With Warm Regards
Tarun Upadhyay

Induslogic Inc.
4th Floor, Picadilly House
276, Capt Gaur Marg, Srinivaspuri
Delhi 110065, India.
P: +91.11.5170.9070 x 5353
F: +91.11.5170.9071
C: +91.9811.535353
E: [EMAIL PROTECTED]
www.induslogic.com 

 

> -----Original Message-----
> From: 
> [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED]
> i.org] On Behalf Of Robins Tharakan
> Sent: Sunday, August 17, 2003 3:46 PM
> To: Linux-Delhi
> Subject: [ilugd] pop on public network
> 
> hi,
> 
> 
> i just did a tcpdump on the local cable wallah network, and 
> realised that anyone with a tcpdump -i eth1 -w file.dump can 
> easily see my pop username/pwd .... 
> 
> is there any way out? or is this the reason why tcpdump is so 
> dear a tool???
> 
> "help"
> 
> affly
> rbs
> 
> 
> _______________________________________________
> ilugd mailing list
> [EMAIL PROTECTED]
> http://frodo.hserus.net/mailman/listinfo/ilugd
> 


_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to