The list of names and valid IP addresses in the XML file, or in the directory (if used), could represent a threat to your system. Only provide access to these files to trusted administrators.
The list of names and valid IP addresses in the XML file, or in the directory (if used), could represent a threat to your system. Only provide access to these files to trusted administrators.