...
Now that the Sentinel HASP software has been installed and it running correctly, it is possible to continue on to Installing the CHARON-SSP Software.
Post-Installation Tasks
The following post installations task are not required. However, for improved security they are highly recommended.
Securing the Sentinel HASP Installation
The configuration file used by the Sentinel HASP software is insecure and open to malicious, unprivileged access and modification unless the following commands are executed:
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
|
The web-based GUI interface is also open to malicious access unless secured appropriately. Use the following steps to secure the software:
Panel | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||
|
Removing the Sentinel HASP Software
...