TCP Wrappers: Part 2
The first entry in the above configuration tells TCP Wrappers that all connections to the RSH daemon should be dropped and a reverse finger should be sent to client, logging all the information obtained.
in.telnetd: 220.127.116.11 192.168.1.
This entry simply denies all connection attempts from the IP address 18.104.22.168 and all machines from the subnet 192.168.1.*.
We hope this up-to-date information on the usage and working of TCP Wrappers will serve you well against the crackers and script kiddies who target unprotected hosts. Just before we wind up, a reminder that securing and fortifying your machines is an on going process and any lax can cost you more than what you bargained for.