Hi all,
Have been asked to learn up on providing Sytem Auditing on two SCO boxes.
Where should I start and what pointers can anyone provide.
Whilst I'm learning to look after these two SCO boxes, I'm also to eventually look after three Compaq DS20E True64 Unix boxes also in the near future. (2 Replies)
Hello,
I am having a problem setting a range of numbers for the "case" structure.
I can use with no problems, but
when I use it doesn't work???
Does the case struture allow numeric ranges?
eg:
echo -e "enter number between 0 and 60: \c"
read $answer
case $answer in
) echo... (2 Replies)
I need to check if $1 is A or B
I tried the following but it seems its not correct..would appreciate a suggestion ?
case "$1"
in
"A" || "B" )
;;
esac
Thanks (4 Replies)
Hi
When im listing (ls -al ) its listing directories without / at the end of directories
dir1 dir2 dir3
and i need to list directories with
dir1/ dir2/ dir3/ and this should not be made by command ls -F
/ should be embedded at the last
since one of the scripts reads directories... (1 Reply)
I am trying to write a script which has to copy the directory structure from my system to another system on the network. But I dont want the files to be copied.
I think I have to start with copying all subdirectories names in a directory to a system on the network.
Here's the case:
Source... (1 Reply)
Hi,
I have a following problem in C.
I have a function A in which I used to call another function (function B) and pass an array of values through array variable by using below:-
foo=functionB(array);
In functionB, i used to just return some "values" (e.g return num;) in order to pass... (1 Reply)
Hello,
I have a Bash script that processes a text file so that the existing file will look something like this:
/www/repository/2010/201002231329532/LTLO_0407.pdf
/www/repository/2010/201002231329532/LTLO_0507.pdf
/www/repository/2010/201002231329532/LTLO_0607.pdf... (1 Reply)
As part of server hardening process i would like to know the Best way of System Logging and Auditing.
Following point should be taken into consideration.
Logging of critical events
Logging access to critical accounts
Secure storage and availability of logs
Review of logs
Security of logs (4 Replies)
Discussion started by: pinga123
4 Replies
LEARN ABOUT DEBIAN
log::agent::driver::syslog
Agent::Driver::Syslog(3pm) User Contributed Perl Documentation Agent::Driver::Syslog(3pm)NAME
Log::Agent::Driver::Syslog - syslog logging driver for Log::Agent
SYNOPSIS
use Log::Agent;
require Log::Agent::Driver::Syslog;
my $driver = Log::Agent::Driver::Syslog->make(
-prefix => prefix,
-facility => "user",
-showpid => 1,
-socktype => "unix",
-logopt => "ndelay",
);
logconfig(-driver => $driver);
DESCRIPTION
The syslog logging driver delegates logxxx() operations to syslog() via the Sys::Syslog(3) interface.
The creation routine make() takes the following switches:
"-facility" => facility
Tell syslog() which facility to use (e.g. "user", "auth", "daemon"). Unlike the Sys::Syslog(3) interface, the facility is set once and
for all: every logging message will use the same facility.
If you wish to log something to "auth" for instance, then do so via Sys::Syslog directly: there is no guarantee that the application
will configure its Log::Agent to use syslog anyway!
"-logopt" => syslog options
Specifies logging options, under the form of a string containing zero or more of the words ndelay, cons or nowait.
"-prefix" => prefix
The prefix here is syslog's identification string.
"-showpid" => flag
Set to true to have the PID of the process logged. It is false by default.
"-socktype" => (unix | inet)
Specifies the logging socket type to use. The default behaviour is to use Sys:Syslog's default.
CHANNELS
All the channels go to syslog(), of course.
AUTHOR
Raphael Manfredi <Raphael_Manfredi@pobox.com>
SEE ALSO Log::Agent::Driver(3), Log::Agent::Channel::Syslog(3).
perl v5.10.0 2002-03-09 Agent::Driver::Syslog(3pm)