Using /etc/hosts.allow and /etc/hosts.deny to secure Linux 2015-06-072015-06-07 gintautas TCP wrapper based access List Rules can be included in the two files /etc/hosts.allow and /etc/hosts.deny . Read More