Hi all,
Have been asked to learn up on providing Sytem Auditing on two SCO boxes.
Where should I start and what pointers can anyone provide.
Whilst I'm learning to look after these two SCO boxes, I'm also to eventually look after three Compaq DS20E True64 Unix boxes also in the near future. (2 Replies)
Hello,
I am having a problem setting a range of numbers for the "case" structure.
I can use with no problems, but
when I use it doesn't work???
Does the case struture allow numeric ranges?
eg:
echo -e "enter number between 0 and 60: \c"
read $answer
case $answer in
) echo... (2 Replies)
I need to check if $1 is A or B
I tried the following but it seems its not correct..would appreciate a suggestion ?
case "$1"
in
"A" || "B" )
;;
esac
Thanks (4 Replies)
Hi
When im listing (ls -al ) its listing directories without / at the end of directories
dir1 dir2 dir3
and i need to list directories with
dir1/ dir2/ dir3/ and this should not be made by command ls -F
/ should be embedded at the last
since one of the scripts reads directories... (1 Reply)
I am trying to write a script which has to copy the directory structure from my system to another system on the network. But I dont want the files to be copied.
I think I have to start with copying all subdirectories names in a directory to a system on the network.
Here's the case:
Source... (1 Reply)
Hi,
I have a following problem in C.
I have a function A in which I used to call another function (function B) and pass an array of values through array variable by using below:-
foo=functionB(array);
In functionB, i used to just return some "values" (e.g return num;) in order to pass... (1 Reply)
Hello,
I have a Bash script that processes a text file so that the existing file will look something like this:
/www/repository/2010/201002231329532/LTLO_0407.pdf
/www/repository/2010/201002231329532/LTLO_0507.pdf
/www/repository/2010/201002231329532/LTLO_0607.pdf... (1 Reply)
As part of server hardening process i would like to know the Best way of System Logging and Auditing.
Following point should be taken into consideration.
Logging of critical events
Logging access to critical accounts
Secure storage and availability of logs
Review of logs
Security of logs (4 Replies)
Discussion started by: pinga123
4 Replies
LEARN ABOUT ULTRIX
storeauthent
getauthuid(3) Library Functions Manual getauthuid(3)Name
getauthuid, storeauthent, setauthfile, endauthent - get/set auth entry
Syntax
#include <sys/types.h>
#include <auth.h>
AUTHORIZATION *getauthuid(uid)
uid_t uid;
int storeauthent(auth)
AUTHORIZATION *auth;
void setauthfile(pathname)
char *pathname;
int endauthent()
Description
The function looks up the auth entry for the specified user ID and returns a pointer to a static area containing it.
The function will store the specified auth entry into the local auth database, overwriting any existing entry with the same a_uid field.
The function will set the pathname of the file to be used for the local auth database in all subsequent operations.
The functions closes the auth database. Subsequent calls to getauthuid and storeauthent will reopen it.
The auth database may be distributed via the BIND/Hesiod naming service.
Restrictions
Only the super-user and members of the group authread may read information from the auth database.
Only the super-user may modify the auth database.
The auth databse may not be distributed via the Yellow Pages service.
Return Values
Functions which return a pointer value will return the null pointer (0) on EOF or error. Other functions will return zero (0) on success
and a negative value on failure.
FilesSee Alsogetpwent(3), auth(5), edauth(8)
Security Guide for Users and Programmers
Security Guide for Administrators
Guide to the BIND/Hesiod Service
getauthuid(3)