Honeypots mailing list archives

securing a bridge


From: <kathya6200 () yahoo com>
Date: 29 May 2003 12:03:32 -0000



Are there any special things to do to secure a bridge other than 
the 'traditional' securing of a linux box?  I am using a bridge in a GenII 
honeypot system, and haven't been able to find much on exploiting a linux 
bridge.


Current thread: