03-04-2002
What distribution and version of unix are you using?
Can be helpfull in providing relevant links.
8 More Discussions You Might Find Interesting
1. UNIX Desktop Questions & Answers
Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level)
Thanks
Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies
2. UNIX Desktop Questions & Answers
Sorry, Unix file security
Thanks (1 Reply)
Discussion started by: DuttO
1 Replies
3. HP-UX
Was wondering if anyone could answer two quick questions... 1) What is the best way to impliment password triviality checking and also checking to make sure a user does not use the same password twice. 2) is there any nice software out there to manage users on multiple machine as far as security... (6 Replies)
Discussion started by: breigner
6 Replies
4. Cybersecurity
Hi everyone,
Does anyone use a good unix security alert provider (such as CERT/SANS) that caters specifically to Unix and would provide a similar method of alert reporting? Any suggestions (with links!! :) ) would be helpful and appreciated.
Thanks in advance
:p (4 Replies)
Discussion started by: cbalemba
4 Replies
5. Cybersecurity
this is a pretty good article that is a little dated, but still very informative at freeos.com.
since this is Network Security for Dummies Q&A, maybe this should be the first step for unix.com users to check for general and more specific info on how to 'harden' their linux box.
some of this... (8 Replies)
Discussion started by: norsk hedensk
8 Replies
6. UNIX for Advanced & Expert Users
I need to log or 'audit' any access to a shared directory which is stored on a NetApp appliance. I need to be able to 'prove' who has acessed the data in this directory at any time. I am just not sure how to do this. The systems that will be accessing this are Linux systems.
Any help is... (2 Replies)
Discussion started by: frankkahle
2 Replies
7. HP-UX
Is there anyway to trace where a user has logged in from.
Someone this morning deleted some data but I only have the following info from the last command
cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02)
cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02)
cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies
8. Solaris
I want to periodically check if ASCII password/config files on Unix have 400 or 600 access. Folders and files are owned by designated group and user. Folders and Files do not have world write access.
Are there any tools/scripts available for this kind of auditing that I can use on Solaris? (7 Replies)
Discussion started by: kchinnam
7 Replies
LEARN ABOUT ULTRIX
dcheck
dcheck(8) System Manager's Manual dcheck(8)
Name
dcheck - check directory consistency
Syntax
/etc/dcheck [ -i numbers ] [ filesystem ]
Description
The command is obsoleted for normal consistency checking by
The command reads the directories in a file system and compares the link-count in each i-node with the number of directory entries by which
it is referenced. If the file system is not specified, a set of default file systems is checked.
The -i flag is followed by a list of i-numbers; when one of those i-numbers turns up in a directory, the number, the i-number of the direc-
tory, and the name of the entry are reported.
The program is fastest if the raw version of the special file is used, since the i-list is read in large chunks.
Diagnostics
When a file turns up for which the link-count and the number of directory entries disagree, the relevant facts are reported. Allocated
files which have 0 link-count and no entries are also listed. The only dangerous situation occurs when there are more entries than links.
If entries are removed, so the link-count drops to 0, the remaining entries point to nothing. They should be removed. When there are more
links than entries, or there is an allocated file with neither links nor entries, some disk space may be lost but the situation will not
degenerate.
Restrictions
Since is inherently two-pass in nature, extraneous diagnostics may be produced if applied to active file systems.
Files
Default file systems vary with installation.
See Also
fs(5), clri(8), fsck(8), icheck(8), ncheck(8)
dcheck(8)