> On Fri, 2 Aug 1996, MegaZone wrote:
> > Yes, or just configure them as PPP uses with strict filters so that they
> > can't do anything except email. Then on the host give them a fake shell
> > so they can't login with Telnet, etc.
I would also make sure either your popper program will allow connections
to users with non-valid shells, or make your fake shell valid which I
wouldnt do. You can also configure most popper programs to utilize a
table of users who are allowed and not allowed to access.
D