Access Control
How to Protect a Sub-tree from certain IP-addresses
How to Protect a Sub-tree from certain Users
How to Protect Individual Files Using ACL-files
How to Protect a Proxy Server
Order of Rules in the Configuration file
What about UNIX's own
passwd
and
group
file?
passwd Carefully - group NO
Henrik Frystyk and Carlos Varela, October 17 1994