TCP Wrappers: Part 2
The first entry in the above configuration tells TCP Wrappers that all connections to the RSH daemon should be dropped and a reverse finger should be sent to client, logging all the information obtained.
in.telnetd: 202.54.11.23 192.168.1.
This entry simply denies all connection attempts from the IP address 202.54.11.23 and all machines from the subnet 192.168.1.*.
Conclusion
We hope this up-to-date information on the usage and working of TCP Wrappers will serve you well against the crackers and script kiddies who target unprotected hosts. Just before we wind up, a reminder that securing and fortifying your machines is an on going process and any lax can cost you more than what you bargained for.
- « first
- ‹ previous
- of 5