<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">Mikel EA2CW via Dxspider-support je
10.2.2025 ob 15:17 napisal:</div>
<div class="moz-cite-prefix"><br>
</div>
<div class="moz-cite-prefix">It takes time to develop but in the
meantime we who have the data can provide it to them to analyse
how the cluster network is being abused and that is what I am
going to do in this last case, a simple example although I would
prefer to leave the communication between the authors and between
Dirk. Anyway, we can increase attention with the example of the
latest dx cluster network exploitation which is occurring with
increasing frequency.</div>
<div class="moz-cite-prefix"><br>
</div>
<div class="moz-cite-prefix">CU Dan S50U</div>
<br>
<div class="moz-cite-prefix"><br>
</div>
<blockquote type="cite"
cite="mid:9f2dee6c-283e-421a-a18e-d91e6369df5f@gautxori.com">Really???
Do N1MM guys think that the weaker part of the telnet network is
the use of telnet protocol instead the possibility of uploading /
injecting of data (spots) by unidentified users? Even if they are
aware of the possibility of passwords being compromissed, that
situation will be better than the "no password needed" one that we
have now, IMHO...
<br>
<br>
Well, let's abandon the insecure telnet protocol and change to ssh
or similar... How will we do without passwords now?
<br>
<br>
Cannot understand certain POVs...
<br>
<br>
73 de Mikel
</blockquote>
<br>
<div class="moz-signature">-- <br>
<a href="https://s50clx.infrax.si">S50CLX DX Cluster</a></div>
</body>
</html>