Cover V06, I05
Article
Figure 1
Figure 2
Listing 1
Listing 2
Listing 3

may97.tar


Listing 1: Sample .rhosts file

# this is an example file that could be used on an NT Server to set
# up a trust relationship with UNIX (or other) client systems
#
# the system names have been changed to protect the guilty
#
# 1. root and uucp userID's can execute commands
# 2. four dwarfs users have access
# 3. remsh -l guest access is allowed from this system

matrix root uucp
snowwhite grumpy sneezy dopey sleepy
wideopen guest root