I need explanation about above question ? Thanks in advance.
Asked
Active
Viewed 380 times
1 Answers
1
It is not secured process so it is not used in many situations.If IP address of system changes we need to make again the hole process.

Chandra Sekhar Y
- 550
- 3
- 9