20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• TCP Wrappers - allows monitoring and control over who connects to a<br />

host’s TFTP, EXEC, FTP, RSH, TELNET, RLOGIN, FINGER, and<br />

SYSTAT ports + a library so that other programs can be controlled and<br />

monitored in the same fashion<br />

• xinetd - a replacement <strong>for</strong> inetd which supports access control based<br />

on the address of the remote host and the time of access + provides<br />

extensive logging capabilities<br />

Maguire U.S. DOE CIAC’s Network Security Tools [19] 12: 21 of 30<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!