by Rich Chesavage, Tower Systems
The purpose of this exercise is to create a situation whereby a user uses SSH telnet (Secure Shell telnet) to receive a d3 logon on a d3/NT machine. Using SSH telnet for d3/NT connections is desired because SSH connections are passing encrypted data. Normal telnet is passing clear text. Do not get lulled into a false sense of security that SSH solves all security problems, it does not. Normal telnet traffic can be sniffed out and viewed by anybody on the internet with a packet sniffer and time. SSH traffic is encrypted which makes it a lot harder to view the data as it passes over the internet. Someone can still intrude into your machine if they have a username and password. SSH does nothing to solve that problem.
***Note: If you have problems with how I put this server together, fine, whatever. Remember that you paid nothing for this help and perhaps you got what you paid for. If you want to take these instructions further and make it better, by all means have at it.