You can do hat you want – you need to add the target computer to the local computer’s TrustedHosts list, and provide a credential. Otherwise it wants SSL. It isn’t so much about encryption as it is about mutual authentication.
↧
You can do hat you want – you need to add the target computer to the local computer’s TrustedHosts list, and provide a credential. Otherwise it wants SSL. It isn’t so much about encryption as it is about mutual authentication.