What are some of the security risks with using CVS?

What will be an ideal response?


First, since CVS uses rsh, that in it self is a major security risk. Rsh transmits data in the clear text and does not allow for any kind of authentication. Also in CVS the developers must have permissions to modify the project so that leaves the door open for developers to hack it.

Computer Science & Information Technology

You might also like to view...

List and describe the status indicators that apply only to a dynamic disk.

What will be an ideal response?

Computer Science & Information Technology

If you select a text wrapping setting of Top and Bottom, text is prevented from wrapping around a table

Indicate whether the statement is true or false

Computer Science & Information Technology

When the border of a shape in a SmartArt graphic appears as a series of dashes (----- ), the ________ can be edited

Fill in the blank(s) with correct word

Computer Science & Information Technology

Fields with a ________ data type can use any aggregate function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology