Securing the .rhosts and hosts.equiv Files
Linux — and all the flavors of UNIX — are file-based operating systems. Practically everything that’s done on the system involves the manipulation of files. This is why so many attacks against Linux are at the file level. Hacks using the hosts.equiv and .rhosts files If hackers can capture a user ID and password by … Read more