02-01-2011
RSH
Aside from what you already know (RSH bad, Mongo not use! Eat SSH instead.) the better way to secure RSH is to combine hosts.allow and hosts.deny so that only the AUTHORIZED stations can use it and NOTHING else. Deny should be the DEFAULT, and you want to only allow those you must.
Not askin', but sure wondering what would force the issue.
Good luck!
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a need to allow only certain IP addresses to access a machine running solaris 9. I am not sure how this can be accomplished.
Thanks in advance for your help.
Patch (2 Replies)
Discussion started by: patch
2 Replies
2. Programming
Hi All
I have a structure pointer and setting that pointer as NULL. When i tried to access the elements in the structure i am getting the error message.
"Cannot access memory at address 0x8". This i tried in LINUX.
When the same program is tried thro UNIX (HP-UX), i am not getting the message... (8 Replies)
Discussion started by: rkraj
8 Replies
3. UNIX for Advanced & Expert Users
Can kernel process access user address space ? (2 Replies)
Discussion started by: subhotech
2 Replies
4. Shell Programming and Scripting
Hi,
I need to block a ip address without logging to the server not for a single server for more number of servers. I use the tool " apf" to block an ip
apf -d <Ipaddress>
Is this can be done with the shell script.? (10 Replies)
Discussion started by: gsiva
10 Replies
5. Cybersecurity
HI,
I'm doing a research on client/server connection. I need to run the server code to open socket connection with the client code. To make the test real, I need to run the server code from a a machine far away from the client over the Internet. IN ORDER TO RUN THE CODE, the client has to know the... (3 Replies)
Discussion started by: ENG_MOHD
3 Replies
6. Solaris
We want to disable graphical logins on our Solaris 10(64bit sparc )boxes, but I haven't found any information on how to do it via google. Most likely I am using the wrong search terms (i've been looking for "xdmcp" and "x11" "disable") .
While looking through the output of "svcs -a | grep... (3 Replies)
Discussion started by: the.gooch
3 Replies
7. What is on Your Mind?
Hello Everyone,
We plan to restrict all RSS news feed access soon based on IP address. This means that if you have a website or application that using our site RSS feeds, you can still do it; but your must register you site in this thread.
So please reply with your IP address of your server... (7 Replies)
Discussion started by: Neo
7 Replies
8. Post Here to Contact Site Administrators and Moderators
Hello Everyone,
We now (only) permit access to our RSS news feed access based on IP address. This means that if you have a website or application that using our site RSS feeds, you can still do it; but your must register you site in this thread.
So please reply with your IP address of your... (9 Replies)
Discussion started by: Neo
9 Replies
9. IP Networking
Hello all,
I am trying to receive (tcp/udp/sctp) traffic from all IPs and, eventually, all ports of an IPv6 address block using as few sockets as possible short of implementing my own network stack.
One possible solution was to associate an IP block to an interface then bind to that... (6 Replies)
Discussion started by: redwil
6 Replies
LEARN ABOUT LINUX
iptables-apply
iptables-apply(8) System Manager's Manual iptables-apply(8)
NAME
iptables-apply - a safer way to update iptables remotely
SYNOPSIS
iptables-apply [-hV] [-t timeout] ruleset-file
DESCRIPTION
iptables-apply will try to apply a new ruleset (as output by iptables-save/read by iptables-restore) to iptables, then prompt the user
whether the changes are okay. If the new ruleset cut the existing connection, the user will not be able to answer affirmatively. In this
case, the script rolls back to the previous ruleset after the timeout expired. The timeout can be set with -t.
When called as ip6tables-apply, the script will use ip6tables-save/-restore instead.
OPTIONS
-t seconds, --timeout seconds
Sets the timeout after which the script will roll back to the previous ruleset.
-h, --help
Display usage information.
-V, --version
Display version information.
SEE ALSO
iptables-restore(8), iptables-save(8), iptables(8).
LEGALESE
iptables-apply is copyright by Martin F. Krafft.
This manual page was written by Martin F. Krafft <madduck@madduck.net>
Permission is granted to copy, distribute and/or modify this document under the terms of the Artistic License 2.0.
2006-06-04 iptables-apply(8)