Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
PHP Web Host - Quality Web Hosting For All PHP Applications

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
Copyright Info
Terms of Use
Privacy Info
Masthead / Impressum
Your Account

Private Messages

News Archive
Submit News
User Articles
Web Links


The Web

Who's Online
There are currently, 74 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here




       tcpdchk [-a] [-d] [-i inet_conf] [-v]


       tcpdchk   examines  your  tcp  wrapper  configuration  and
       reports all potential and real problems it can  find.  The
       program   examines  the  tcpd  access  control  files  (by
       default, these are /etc/hosts.allow and  /etc/hosts.deny),
       and compares the entries in these files against entries in
       the inetd or tlid network configuration files.

       tcpdchk reports problems such as  non-existent  pathnames;
       services that appear in tcpd access control rules, but are
       not controlled  by  tcpd;  services  that  should  not  be
       wrapped;  non-existent  host names or non-internet address
       forms; occurrences of host  aliases  instead  of  official
       host  names;  hosts with a name/address conflict; inappro­
       priate use of wildcard patterns; inappropriate use of  NIS
       netgroups  or  references  to  non-existent NIS netgroups;
       references to non-existent options; invalid  arguments  to
       options; and so on.

       Where  possible,  tcpdchk provides a helpful suggestion to
       fix the problem.


       -a     Report access  control  rules  that  permit  access
              without  an  explicit  ALLOW  keyword. This applies
              only when the extended access control  language  is
              enabled (build with -DPROCESS_OPTIONS).

       -d     Examine  hosts.allow  and  hosts.deny  files in the
              current directory instead of the default ones.

       -i inet_conf
              Specify this option when tcpdchk is unable to  find
              your  inetd.conf or tlid.conf network configuration
              file, or when you suspect that the program uses the
              wrong one.

       -v     Display  the  contents of each access control rule.
              Daemon lists,  client  lists,  shell  commands  and
              options  are shown in a pretty-printed format; this
              makes it easier for you to spot  any  discrepancies
              between  what  you want and what the program under­


       The default locations of the tcpd  access  control  tables

       5600 MB Eindhoven, The Netherlands




Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!

Amazon Wish List

Did You Know?
The Linux Tutorial welcomes your suggestions and ideas.


Tell a Friend About Us

Bookmark and Share

Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.12 Seconds