Are there any special things to do to secure a bridge other than 
the 'traditional' securing of a linux box?  I am using a bridge in a GenII 
honeypot system, and haven't been able to find much on exploiting a linux 
bridge.

Reply via email to