Pick a Free OS

User login


TCP Wrappers: Part 2

The first entry in the above configuration tells TCP Wrappers that all connections to the RSH daemon should be dropped and a reverse finger should be sent to client, logging all the information obtained.

in.telnetd: 192.168.1.

This entry simply denies all connection attempts from the IP address and all machines from the subnet 192.168.1.*.


We hope this up-to-date information on the usage and working of TCP Wrappers will serve you well against the crackers and script kiddies who target unprotected hosts. Just before we wind up, a reminder that securing and fortifying your machines is an on going process and any lax can cost you more than what you bargained for.