12-04-2010
Hi,
it depends on the operating system you are using and which program does the logging.
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
hi,
what is the difference between logging into unix through f-secure ssh client and telnet
is there any more security check is involved
can any one explain
thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies
2. SCO
Dear All,
Kindly guide how to Disable the SNMP Service on sco unix release 5.0
Regards (2 Replies)
Discussion started by: sak900354
2 Replies
3. Red Hat
Hello all,
I recently deleted some lines from the messages and secure files, in /var/log and now they are not keeping a log anymore. The last update shows the date of when I deleted the lines.
I had to delete some failed login attempts to stop denyhosts from blocking the ips (probably not the... (3 Replies)
Discussion started by: z1dane
3 Replies
4. Shell Programming and Scripting
What is difference in the below Two commands?
1) tlsftp -v -d -i -a -z verify=0 opts=17 $SERVERNAME << !
2) tlsftp -i -v -n ${ SERVERNAME } << !
Presently I am using the second command for get the files from Mainframe system to Unix system. But it is not secure.
Now i want to... (0 Replies)
Discussion started by: gbellamk
0 Replies
5. Linux
Hello,
is there a way to disable connection logging for a specific service? Or eventually to disable /var/log/secure in general?
Closed. Double post (0 Replies)
Discussion started by: TehOne
0 Replies
6. Cybersecurity
Hello everyone. I'm a newbie and this is my first post, and I'm hoping to get some help understanding what happened on my server. I did as much research as I could, but now I turn to the forums for help :)
I've set up a VPS server and I "thought" I had good enough security on it, but all of a... (2 Replies)
Discussion started by: antondev
2 Replies
7. Solaris
hello all,
i have a question if i have two servers each one run an application i want to make a tunnel channel between the two servers the two application each one has a specific port .
for example server A has port 2001 and server B has port 2002
server A talk to server A using any... (1 Reply)
Discussion started by: maxim42
1 Replies
8. Red Hat
Hi,
We all know as we can connect remote system through ssh without entering username and password by copy the public key to remote host using ssh-copy-id. But my query is to i want to restrict the user as do not implement this feature.Whenever he is trying to login, he has to enter his/her... (1 Reply)
Discussion started by: mastansaheb
1 Replies
9. Shell Programming and Scripting
I have been searching and reading about syslog. I would like to know how to Transfer the logs being thrown into /var/log/messages into another file example /var/log/volumelog.
tail -f /var/log/messages
dblogger: msg_to_dbrow: no logtype using missing
dblogger: msg_to_dbrow_str: val ==... (2 Replies)
Discussion started by: kenshinhimura
2 Replies
LEARN ABOUT LINUX
postlog
POSTLOG(1) General Commands Manual POSTLOG(1)
NAME
postlog - Postfix-compatible logging utility
SYNOPSIS
postlog [-iv] [-c config_dir] [-p priority] [-t tag] [text...]
DESCRIPTION
The postlog(1) command implements a Postfix-compatible logging interface for use in, for example, shell scripts.
By default, postlog(1) logs the text given on the command line as one record. If no text is specified on the command line, postlog(1) reads
from standard input and logs each input line as one record.
Logging is sent to syslogd(8); when the standard error stream is connected to a terminal, logging is sent there as well.
The following options are implemented:
-c config_dir
Read the main.cf configuration file in the named directory instead of the default configuration directory.
-i Include the process ID in the logging tag.
-p priority
Specifies the logging severity: info (default), warn, error, fatal, or panic.
-t tag Specifies the logging tag, that is, the identifying name that appears at the beginning of each logging record. A default tag is used
when none is specified.
-v Enable verbose logging for debugging purposes. Multiple -v options make the software increasingly verbose.
ENVIRONMENT
MAIL_CONFIG
Directory with the main.cf file.
CONFIGURATION PARAMETERS
The following main.cf parameters are especially relevant to this program.
The text below provides only a parameter summary. See postconf(5) for more details including examples.
config_directory (see 'postconf -d' output)
The default location of the Postfix main.cf and master.cf configuration files.
syslog_facility (mail)
The syslog facility of Postfix logging.
syslog_name (see 'postconf -d' output)
The mail system name that is prepended to the process name in syslog records, so that "smtpd" becomes, for example, "postfix/smtpd".
SEE ALSO
postconf(5), configuration parameters
syslogd(8), syslog daemon
LICENSE
The Secure Mailer license must be distributed with this software.
AUTHOR(S)
Wietse Venema
IBM T.J. Watson Research
P.O. Box 704
Yorktown Heights, NY 10598, USA
POSTLOG(1)