First page Back Continue Last page Summary Graphics
Who do I want to be today?
Protection
- Protect your perimeter
- Use a highly configurable, proxy-based firewall
- Turn off unnecessary services
- If you need finger services, force the use of usernames
- Do not share unnecessary resources
- Allow connections only from trusted systems
-