High Performance Computing Cookbook for MSIS …

It is also strongly recommended to configure the Linux bash shell to log all shell command activity to Linux system logs. Network Access. It is recommended to disable telnet, ftp, rsync, rsh, finger and chargen as these network programs are insecure. These network programs will send out user name and password in clear text. ................
................