kathya6200 Sat, 31 May 2003 08:51:21 -0700
Are there any special things to do to secure a bridge other than the 'traditional' securing of a linux box? I am using a bridge in a GenII honeypot system, and haven't been able to find much on exploiting a linux bridge.