On 12 Jan 2005 12:39:05 -0800, Kartic <[EMAIL PROTECTED]> wrote: > Hi, > > Can you use ssh tunneling? You will not be changing anything except add > an extra ssh layer to tunnel your data through.
Or, rather, he wouldn't be changing anything at all in the program itself. The approach would be "Ok, so this protocol is insecure. If you want to protect yourself from eavesdropping and man-in-the-middle attacks along the ways, you have to feed it through an ssh tunnel or something similar". But we don't really know what this person wants to accomplish, so this may or may not be a viable option. /Jorgen -- // Jorgen Grahn <jgrahn@ Ph'nglui mglw'nafh Cthulhu \X/ algonet.se> R'lyeh wgah'nagl fhtagn! -- http://mail.python.org/mailman/listinfo/python-list