Lines Matching +full:secure +full:- +full:monitor
3 tcpd \- access control facility for internet services
6 The \fItcpd\fR program can be set up to monitor incoming requests for
9 that have a one-to-one mapping onto executable files.
11 The program supports both 4.3BSD-style sockets and System V.4-style
21 Optional features are: pattern-based access control, client username
39 matching. The access-control software provides hooks for the execution
49 verifies the client host name that is returned by the address->name DNS
51 name->address DNS server. If any discrepancy is detected,
56 If the sources are compiled with -DPARANOID,
64 disables source-routing socket options on every connection that it
70 When RFC 931 etc. lookups are enabled (compile-time option) \fItcpd\fR
72 succeed only if the client host runs an RFC 931-compliant daemon.
73 Client user name lookups will not work for datagram-oriented
83 In order to monitor access to the \fIfinger\fR service, move the
102 In order to monitor access to the \fIfinger\fR service, perform the
123 covered by \fItcpd\fR. Send a `kill -HUP\' to the \fIinetd\fR(8)
146 only non-trivial service that is affected by this limitation is
148 loss. On most systems, \fIrexd\fR is less secure than a wildcard in