This is an excerpt from a security book and i have no idea how to do what they are saying. Maybe someone here knows what the author is talking about.
Many internet programs allow TCP wrappers to be compiled in, ahd Ssh is such an example. When configuring SSH, simply pass the configure program with the --with-tcp-wrappers option. You can then add an entry into /etc/hosts.allow such as:
sshd: .example.com .trusted_network.org trusted_machine.example.org
What i dont understand is the configure program with the --with-tcp-wrappers option. What the heck does it mean and how do i do it.
Thanks as always
