home *** CD-ROM | disk | FTP | other *** search
- With the following two programs you log can all requests for the SYSTAT,
- FINGER, FTP, TELNET, RLOGIN, RSH and EXEC network services. Connections
- are logged via the syslog(3) facility.
-
- This may help you to detect if some cracker tries to get into your system
- via internet.
-
- The programs are tiny front ends that report the remote host name and
- then invoke the real network daemon. Thus, you will not need to change
- systems software or configuration files. Just move the real daemons to
- another subdirectory and install the front ends in their original
- places. See the source for details.
-
- These programs were tested with Ultrix >= 2.2, with SunOS >= 3.4 and
- some obscure System V Release 2 port.
-
- There is a little-tested facility to refuse connections from hosts or
- domains listed in an external text file. The format of that file is:
- one host name or domain name per line; no blanks or empty lines. See
- the Makefile for details.
-
- Wietse Venema,
- Mathematics and Computing Science,
- Eindhoven University of Technology,
- The Netherlands.
-