Depending on application requirements, other packaging technologies for consideration include:

  1. Choosing a restricted shell for login of a captive user, such as rbash, instead of /bin/sh (for example, see

  2. Setting up a chroot environment for an application used by captive users (for example, see

  3. Using TCP wrappers to filter incoming requests (for example, see

  4. Configuring mandatory access controls, such as SELinux (for example,

loading table of contents...