From HP-UX 11.31 Security Technical Implementation Guide
Part of GEN006620
Associated with IA controls: ECSC-1
Associated with: CCI-000366
If the system's access control program is not configured with appropriate rules for allowing and denying access to system network resources, services may be accessible to unauthorized hosts.
Check for the existence of the /etc/hosts.allow and /etc/hosts.deny files (normally located within the /etc directory).
# find /etc -type f -name hosts.allow -o -name hosts.deny | xargs -n1 ls -lL
If either file does not exist, this is a finding.
Check for the presence of a deny by default entry.
cat
Edit the
Lavender hyperlinks in small type off to the right (of CSS
class
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Powered by sagemincerPro Tips
id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
Accept:
text/turtle
or
Accept: application/rdf+xml
.