5. Never Use IP-based Authentication
The Berkeley R services were designed in a world of trust
They can use IP-based authentication
IP-based authentication is a bad idea
Previous slide
Next slide
Back to first slide
View graphic version