locally-executed programs, and file descriptors. It can do host-based
access control. It will log incoming TCP connections by hostname and
username (as reported by identd on the connecting host). It subsumes the
locally-executed programs, and file descriptors. It can do host-based
access control. It will log incoming TCP connections by hostname and
username (as reported by identd on the connecting host). It subsumes the