Securing the Network Time Protocol. Note: This article gives some recommendations to shore up the ntp.conf file in order to prevent the abuse. -- Tom