. . .
63
4 Setting up
security for
incoming
connections
64 Allowing incoming connections
66 Denying access to certain drives and folders
68 Locking out password crackers
70 Allowing or requiring callbacks
72 Protecting your security settings with a password
74 Encrypting information over incoming connections