On Mon, 29 Nov 1999, Ethan Benson wrote:
> On 30/11/99 Martin Dickopp wrote:
>
> >Read the section "Restricted Shell" in the bash documentation; this
> >might be what you're looking for. In restricted mode, you can
> >control what commands bash can execute, so you could limit them
> >to telnet a
On 30/11/99 Martin Dickopp wrote:
Read the section "Restricted Shell" in the bash documentation; this
might be what you're looking for. In restricted mode, you can
control what commands bash can execute, so you could limit them
to telnet and ssh.
I tried this out once, it was interesting, but
Jim McCloskey wrote:
>
> Can I ask for some advice?
>
> We've just set up two Slink machines in a graduate student lab. They
> have ethernet connections; there is no firewall. Some of the students
> want to do all their work in a regular way on these machines and those
> students have user acco
On Mon, 29 Nov 1999, Jim McCloskey wrote:
> Can I ask for some advice?
>
> We've just set up two Slink machines in a graduate student lab. They
> have ethernet connections; there is no firewall. Some of the students
> want to do all their work in a regular way on these machines and those
> stud
On Mon, 29 Nov 1999 14:49:04 -0800
Jim McCloskey <[EMAIL PROTECTED]> wrote:
> Is there a safe way to set up a `guest' user-account with a
> publicly known password?
The usual method is to set it up in a chroot jail using a restricted
shell.
--
J C Lawrence Home
5 matches
Mail list logo