home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!ux1.cso.uiuc.edu!lemson
- From: lemson@ux1.cso.uiuc.edu (David Lemson)
- Subject: Re: unhappy about overloading finger
- Message-ID: <Bs19CM.HrI@ux1.cso.uiuc.edu>
- Organization: University of Illinois at Urbana
- References: <199207230140.AA18677@fnord.wang.com> <1992Jul23.032058.3292@reed.edu> <dank.711867106@blacks.jpl.nasa.gov> <1992Jul23.051821.3648@reed.edu>
- Date: Mon, 27 Jul 1992 05:45:44 GMT
- Lines: 15
-
- nelson@reed.edu (Nelson Minar) writes:
-
- >Did Sun provide patches for my Ultrix machines, my Dynix boxes, and my
- >stupid NeXT machines? How about patches to the bugs that probably
- >exist in NeXT's netinfo? And how about patches to the other devious
- >ways people can think to coerce password files out of YP?
-
- If you implement the Trusted_Networks: property in your root domain,
- no one outside of networks that you specify will be able to connect
- to your netinfo server and steal your maps.
- --
- David Lemson (217) 244-1205
- University of Illinois NeXT Campus Consultant / CCSO NeXT Lab System Admin
- Internet : lemson@uiuc.edu UUCP :...!uiucuxc!uiucux1!lemson
- NeXTMail accepted BITNET : LEMSON@UIUCVMD
-