Полезная информация

Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 15.8 UUCP Over NetworksChapter 15
UUCP
Next: 16. TCP/IP Networks
 

15.9 Summary

Although UUCP can be made relatively secure, most versions of UUCP, as distributed by vendors, are not. If you do not intend to use UUCP, you may wish to delete (or protect) the UUCP system altogether. If you are not running UUCP, check the permissions on the uucppublic directory, and set them to 0.

If you do use UUCP:


Previous: 15.8 UUCP Over NetworksPractical UNIX & Internet SecurityNext: 16. TCP/IP Networks
15.8 UUCP Over NetworksBook Index16. TCP/IP Networks