![]() |
File Search | Catalog | Content Search |
These programs log the client host name of incoming telnet, ftp, rsh, rlogin, finger etc. requests.
Security options are: - access control per host, domain and/or service; - detection of host name spoofing or host address spoofing; - booby traps to implement an early-warning system.
Homepage: | - |
Package version: | 7.6.q-24 |
Architecture: | i386 |
Distribution: | Debian |
Filename: | libwrap0-dev_7.6.q-24_i386.deb |
HOSTS_ACCESS(3) HOSTS_ACCESS(3) NAME hosts_access, hosts_ctl, request_init, request_set - access control library SYNOPSIS #include <tcpd.h> extern int allow_severity; extern int deny_severity; struct request_info *request_init(request, key, value, ..., 0) struct request_info *request; struct reque more»
[DIR] | DEBIAN/ (3) 65535+ mirrors | ||
[DIR] | usr/ (3) 65535+ mirrors |