Matrox Iris E Series Installation And Technical Reference page 68

With design assistant
Table of Contents

Advertisement

C h a p t e r 5 : A c c e s s i n g M a t r o x I r i s E - S e r i e s
• Limiting services (such as, folder browsing and anonymous FTP) to the minimum
• Restricting the list of users.
• Enabling logging whenever possible, and checking it often for unauthorized access.
• Reducing the maximum number of simultaneous connections.
• Reducing the number of shared folders.
• Using hard to guess user names and passwords containing both alphabetic and
Additional methods of securing your Matrox Iris E-Series include the following:
required.
numeric characters.

Advertisement

Table of Contents
loading

Table of Contents