Sponsored Content
Full Discussion: Unix Security and auditing
Special Forums Cybersecurity Unix Security and auditing Post 16543 by Cameron on Monday 4th of March 2002 07:24:58 AM
Old 03-04-2002
What distribution and version of unix are you using?
Can be helpfull in providing relevant links.
 

8 More Discussions You Might Find Interesting

1. UNIX Desktop Questions & Answers

Basic Unix Security

Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level) Thanks Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies

2. UNIX Desktop Questions & Answers

Unix Security

Sorry, Unix file security Thanks (1 Reply)
Discussion started by: DuttO
1 Replies

3. HP-UX

unix security

Was wondering if anyone could answer two quick questions... 1) What is the best way to impliment password triviality checking and also checking to make sure a user does not use the same password twice. 2) is there any nice software out there to manage users on multiple machine as far as security... (6 Replies)
Discussion started by: breigner
6 Replies

4. Cybersecurity

Unix Security Alerts

Hi everyone, Does anyone use a good unix security alert provider (such as CERT/SANS) that caters specifically to Unix and would provide a similar method of alert reporting? Any suggestions (with links!! :) ) would be helpful and appreciated. Thanks in advance :p (4 Replies)
Discussion started by: cbalemba
4 Replies

5. Cybersecurity

Unix Security

this is a pretty good article that is a little dated, but still very informative at freeos.com. since this is Network Security for Dummies Q&A, maybe this should be the first step for unix.com users to check for general and more specific info on how to 'harden' their linux box. some of this... (8 Replies)
Discussion started by: norsk hedensk
8 Replies

6. UNIX for Advanced & Expert Users

Unix Auditing.

I need to log or 'audit' any access to a shared directory which is stored on a NetApp appliance. I need to be able to 'prove' who has acessed the data in this directory at any time. I am just not sure how to do this. The systems that will be accessing this are Linux systems. Any help is... (2 Replies)
Discussion started by: frankkahle
2 Replies

7. HP-UX

Unix security

Is there anyway to trace where a user has logged in from. Someone this morning deleted some data but I only have the following info from the last command cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02) cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02) cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies

8. Solaris

Unix file, folder permissions, security auditing tools.

I want to periodically check if ASCII password/config files on Unix have 400 or 600 access. Folders and files are owned by designated group and user. Folders and Files do not have world write access. Are there any tools/scripts available for this kind of auditing that I can use on Solaris? (7 Replies)
Discussion started by: kchinnam
7 Replies
dcheck(8)						      System Manager's Manual							 dcheck(8)

Name
       dcheck - check directory consistency

Syntax
       /etc/dcheck [ -i numbers ] [ filesystem ]

Description
       The command is obsoleted for normal consistency checking by

       The command reads the directories in a file system and compares the link-count in each i-node with the number of directory entries by which
       it is referenced.  If the file system is not specified, a set of default file systems is checked.

       The -i flag is followed by a list of i-numbers; when one of those i-numbers turns up in a directory, the number, the i-number of the direc-
       tory, and the name of the entry are reported.

       The program is fastest if the raw version of the special file is used, since the i-list is read in large chunks.

Diagnostics
       When  a	file  turns  up for which the link-count and the number of directory entries disagree, the relevant facts are reported.  Allocated
       files which have 0 link-count and no entries are also listed.  The only dangerous situation occurs when there are more entries than  links.
       If entries are removed, so the link-count drops to 0, the remaining entries point to nothing.  They should be removed.  When there are more
       links than entries, or there is an allocated file with neither links nor entries, some disk space may be lost but the  situation  will  not
       degenerate.

Restrictions
       Since is inherently two-pass in nature, extraneous diagnostics may be produced if applied to active file systems.

Files
       Default file systems vary with installation.

See Also
       fs(5), clri(8), fsck(8), icheck(8), ncheck(8)

																	 dcheck(8)
All times are GMT -4. The time now is 05:46 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy