What are some of the security risks with using CVS?
What will be an ideal response?
First, since CVS uses rsh, that in it self is a major security risk. Rsh transmits data in the clear text and does not allow for any kind of authentication. Also in CVS the developers must have permissions to modify the project so that leaves the door open for developers to hack it.
Computer Science & Information Technology
You might also like to view...
What is the sixth step in logical troubleshooting?
A) Verify full system functionality. B) Test the theory to determine the cause. C) Document findings, actions, and outcomes. D) Establish a plan of action.
Computer Science & Information Technology
Adding ____________________ styles to the navigation list items allows them to change when the pointer is positioned over them.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology