Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

It connects to the associated production instance as root, so it provides nearly unrestricted to the instance and is therefore very insecure and dangerous.

The main steps to configure the data edit tool for a specific PC are:

...

This page contains the following information:

Table of Contents

Table of Contents

Configure Putty

...