Home > Articles > Operating Systems, Server > Linux/UNIX/Open Source

Security Tools

  • Print
  • + Share This
From the author of

Endnotes

  1. This set of rules is not something you'd want to use in real life, it is meant only to help exercise your installation of the tools.

  2. Okay, you should go subscribe to the mailing list anyway. Go, do it now. I'll wait right here.

  3. There are several replacements for inetd, including Xinetd, which is discussed in the section "Xinetd" in this chapter.

  4. This is not entirely true; tcp wrappers can be used to control initial access to UDP-based services. Most of the services require that the daemon be left running for a short period of time after the most recent connection. This means that only the connections which require a daemon to be started will be logged and subjected to testing.

  5. This is not a subnet mask. I'm using the CIDR-style notation to indicate the range of addresses used by the IS and Data Center LANs.

  6. otp-md5 is actually another name for opiekey. Using it this way indicates that you are using md5-style encryption to generate the response from the pass phrase.

  • + Share This
  • 🔖 Save To Your Account