This prevents malicious middle-men attacks. Despite all these, the new version has a security fix in that after authentication, PuTTY does not store a user’s keys in memory. There are some reported cases of a Trojan version in circulation. It can also cause memory corruption.Ī corrupt server can also execute the malware on the client. For example, a corrupted remote server can execute code on a client even on a downloaded file. This is because earlier versions do have some security loopholes. It is, however, important to note the latest version is recommended.
0 Comments
Leave a Reply. |