Sponsored Content
Full Discussion: Solaris 8 security log issue
Operating Systems Solaris Solaris 8 security log issue Post 90310 by RTM on Monday 21st of November 2005 03:14:28 PM
Old 11-21-2005
Check to see if you have auth.info in your /etc/syslog.conf - if not, put it in and point it to it's own file (like /var/adm/authlog). You should get the information you need after making the change and sending a HUP signal to syslogd.

See the man page for syslog.conf and syslogd
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Security Issue with Standard Input?

Hi Gang, Running a script in AIX 5.3. Users wanted me to add a "confirm you want to run script, enter 'y' or 'n'" kind of thing... here is what I came up with: #!/bin/sh myfile=`basename "$1"` dateNow=`date "+%m.%d.%Y.%H.%M.%S"` # Get current date mydatedfile=$myfile.$dateNow... (2 Replies)
Discussion started by: yall
2 Replies

2. UNIX for Advanced & Expert Users

Any takers on a security issue

Hi All I have a issue We have a server that the network configuration changed very recently, this unusual and this has now turned in to a security incident. Because I just finished verifying all logs Su log, syslog, messages, sudosh.logs sudo,logs and I can’t find any... (8 Replies)
Discussion started by: Ex-Capsa
8 Replies

3. Red Hat

not able to Send mail due to Security Issue

Hi All, I am trying to send a mail from my application through SMTP in solaris 9 but unable to send a mail.Same code is able to send mail in Windows. As unix has more security,So as per me,it is due to security reason.. So please let me know what I need to do to send a mail properly. what... (5 Replies)
Discussion started by: smartgupta
5 Replies

4. UNIX for Dummies Questions & Answers

Security issue and temp files

Hello, One of the senior network admins at work told me that I should not hard code temp files into my scripts. Rather I should use the mktemp commands in the script to create them on the fly. His argument was that if a malicious user knew the name of my temp files in the script they could... (6 Replies)
Discussion started by: mojoman
6 Replies

5. Red Hat

security issue

Hi all, Can someone please help to provide solutions for below security-related Linux server issue? Level : 2 UDP Constant IP Identification Field Fingerprinting Vulnerability Level : 2 TCP Sequence Number Approximation Based Denial of Service Level : 2 Operating System Detected Level : 2... (1 Reply)
Discussion started by: lseowhua
1 Replies

6. Red Hat

Zimbra Mail Server Security Issue

Hello, I have issue with my Zimbra Mail Server 6.0.7. In that i have configured HTTPS for client login and for whole session. but it stills communicate in http based authentication. due to that some sniffing software are easily sniffing details. So how do i configure completely HTTPS in... (3 Replies)
Discussion started by: Chintanghanti
3 Replies

7. UNIX for Beginners Questions & Answers

Finger command and security issue

$ finger yeti Login: yeti Name: yeti Directory: /arpa/tz/y/yeti Shell: /bin/ksh On since Wed Apr 2 15:24 (UTC) on pts/149 Mail last read Mon Mar 31 11:08 2014 (UTC) No Plan. Hi there, I am trying to... (2 Replies)
Discussion started by: alvinoo
2 Replies

8. UNIX for Beginners Questions & Answers

X Windows Security Issue

Hi there, I am trying to understanding the difference between X11, host- based versus user-based access controls. And how vulnerability can the X11 settings be and why it is recommended to turn it off. (1 Reply)
Discussion started by: alvinoo
1 Replies
SYSLOG(8)                                                         System Logging                                                         SYSLOG(8)

NAME
syslog-ng, syslogd DESCRIPTION
There are different syslog daemon implementations supported as the system's syslog service, currently syslogd, syslog-ng and rsyslogd The first installed daemon activates itself for the syslog service. Starting with openSUSE-11.2, it is rsyslogd, before it was syslog-ng. But this depends on the software selection during the installation. The name of the daemon used as syslog service is specified in the SYSLOG_DAEMON variable in /etc/sysconfig/syslog. The yast2 sysconfig module provides a comfortable way to switch to another installed daemon and restart the service. The /etc/init.d/syslog init script is able to handle all supported daemons. BUGS
Please report bugs at <http://www.suse.de/feedback> AUTHOR
Juergen Weigert <jw@novell.com> Marius Tomaschewski <mt@novell.com> SEE ALSO
sysklogd(8) syslogd(8) syslog.conf(5) syslog-ng(8) syslog-ng.conf(5) rsyslogd(8) rsyslog.conf(5) syslog May 2008 SYSLOG(8)
All times are GMT -4. The time now is 11:02 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy