rlogin, finger etc. requests. Security options are: access control per
host, domain and/or service; detection of host name spoofing or host
address spoofing; booby traps to implement an early-warning system.
-
TCP Wrappers can be gotten at ftp://ftp.porcupine.org/pub/security/
+Netatalk uses TCP Wrappers to authorize host access when using
+afpovertcp. It should be noted that if DDP is in use, the connection
+will still be allowed as TCP Wrappers do not impact DDP connections.
7. PAM (Pluggable Authentication Modules for Linux)
Linux-PAM provides a flexible mechanism for authenticating
You can get the Linux PAM documentation and sources from
http://www.kernel.org/pub/linux/libs/pam/
+
+8 Berkeley DB version 3
+Berkeley DB is a programmatic toolkit that provides fast, reliable,
+scalable, and mission-critical database support to software
+developers. BDB 3 can downloaded from
+http://www.sleepycat.com/download.html
+Netatalk's CNID database uses the library and header files from BDB3.