• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..03-May-2022-

AUTHORSH A D03-May-2022334 1611

BUGSH A D03-May-2022761 2017

CONTRIBUTORSH A D03-May-2022184 85

COPYINGH A D03-May-202217.6 KiB341281

COPYRIGHTH A D03-May-2022786 1813

ChangeLogH A D03-May-20221.8 KiB3530

INSTALLH A D03-May-2022427 2414

MakefileH A D03-May-20221 KiB5739

READMEH A D03-May-2022717 3017

ReleaseH A D03-May-20221.1 KiB1816

TODOH A D03-May-2022268 118

VERSIONH A D03-May-202211 21

antixploit.cH A D03-May-20223.3 KiB13268

command.cH A D03-May-20226.5 KiB210109

config.cH A D03-May-20224.7 KiB17997

delbadfiles.cH A D03-May-20227.1 KiB240160

example.allowall.xtnsH A D03-May-202291 2927

example.denyall.xtnsH A D03-May-202239 31

execute.cH A D03-May-20223.8 KiB16090

globals.cmdsH A D03-May-2022244 98

globals.xtnsH A D03-May-202248 43

ibsh.hH A D03-May-20223.7 KiB12574

jail.cH A D03-May-20222.9 KiB10242

main.cH A D03-May-20227.7 KiB231135

misc.cH A D03-May-20221.5 KiB539

README

1	Iron Bars SHell - a restricted interactive shell.
2
3Overview
4
5	For long i have been in the search of a decent restricted shell, but in vain.
6	The few i found, were really easy to hack, and there were quite a few docs
7	around on the web about hacking restricted shells with a menu interface.
8	For my definitions, a restricted shell must not only prevent the user to
9	escape her jail, but also not to access any files outside the jail.
10	The system administrator must have total control over the restricted shell.
11	These are the major features incorporated and realized by ibsh.
12
13
14Features
15
16	Please read the changelog.
17
18
19Installation
20
21	Read the INSTALL file.
22
23
24Contact
25	See Authors file.
26
27
28Attila Nagyidai
292005.05.23.
30