...
It connects to the associated production instance as root, so it provides nearly unrestricted to the instance and is therefore very insecure and dangerous.
The main steps to configure the data edit tool for a specific PC are:
...
This page contains the following information:
Table of Contents |
---|
Table of Contents |
---|
Configure Putty
...