In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!
Log from the SSH Client the user is using: Initiating SSH session at Tue Jul 07 14:45:09 2009 Attempting login as user davsm, protocol 2 Remote protocol version 2.0,remote software version OpenSSH_4.3 match: OpenSSH_4.3 pat OpenSSH* Remote is NON-HPN aware datafellows = 2000000 Local version string SSH-2.0-SecureNetTerm-3.1 SSH2_MSG_KEXINIT sent SSH2_MSG_KEXINIT received kex: server->client aes256-cbc hmac-sha1 none kex: client->server aes256-cbc hmac-sha1 none Selected Kex Method = diffie-hellman-group-exchange-sha1 hostkeyalg = ssh-dss SSH2_MSG_KEX_DH_GEX_REQUEST(1024<4096<8192) sent expecting SSH2_MSG_KEX_DH_GEX_GROUP SSH2_MSG_KEX_DH_GEX_INIT sent expecting SSH2_MSG_KEX_DH_GEX_REPLY Host '172.16.4.14' is known and matches the DSA host key. Found key in C:\Users\Davsm\AppData\Roaming\InterSoft Common\known_hosts:2 verify_host_key_callback, host accepted SSH2_MSG_NEWKEYS sent expecting SSH2_MSG_NEWKEYS SSH2_MSG_NEWKEYS received ssh_kex2 complete, hostOK=1 send SSH2_MSG_SERVICE_REQUEST service_accept: ssh-userauth got SSH2_MSG_SERVICE_ACCEPT authentications that can continue: publickey,gssapi-with-mic,password,keyboard-interactive next auth method to try is password ssh-userauth2 successful: method password Authentication complete. channel 0: rfd=-1, wfd=-1, new [client-session] Entering interactive session. NetWatchProc is running Starting client_init_dispatch, compat20 = 1 client_init id 0 Requesting pty. client session id: id 0 channel 0: open confirm rwindow 0 rmax 32768 Adjusting channel 0 by 131072, new = 131072