Back to Results
First PageMeta Content
System software / Internet standards / Daemon / Telnet / Finger protocol / Inetd / TCP Wrapper / Rlogin / File Transfer Protocol / Internet protocols / Internet / Computing


TCP WRAPPER Network monitoring, access control, and booby traps. Wietse Venema Mathematics and Computing Science Eindhoven University of Technology The Netherlands
Add to Reading List

Document Date: 2007-09-28 05:27:00


Open Document

File Size: 25,91 KB

Share Result on Facebook

City

San Francisco / /

Company

AT&T / /

Country

France / United States / Netherlands / /

/

Facility

Groningen University / Computing Science Eindhoven University of Technology / Eindhoven University of Technology / Building Internet Firewalls / Eindhoven University / /

IndustryTerm

internet access / early-warning systems / rsh / Internet Firewalls / tftp protocol / systems software / system software bugs / software bugs / dozen systems / real telnet server / Internet worm incident / rlogin / telephone / organizational network / firewall computer systems / file systems / telnet user login client server / terminal server / trivial file transfer protocol / reverse finger tool / firewall systems / network software / /

OperatingSystem

UNIX / MS-DOS / SunOS / Ultrix / /

Organization

MIT / Stanford university / V Scott Office / National Aeronautics and Space Administration / Wietse Venema Mathematics and Computing Science Eindhoven University / Groningen University / Emergency Response Team / Eindhoven University / Eindhoven University of Technology / Stanford / /

Person

Bill Cheswick / Adrian Cooper Directory / Jan Jan Jan Jan / Mark V Scott / Stephen Hansen / /

/

Position

present system administrator / author / system administrator / consultant at the division / /

ProvinceOrState

Hawaii / /

SportsLeague

Stanford university / /

Technology

trivial file transfer protocol / firewall / UNIX / Network routers / terminal server / firewall system / UDP / TCP/IP / X server / tftp protocol / /

SocialTag