I dont know if this is what you are looking for but something like this will email it too you daily.
Dont know if this is on the right track, but it is just a simple script that you can put in cron that will check files and email too you. For any other files you want just put them in there as a new line.
Hi Team,
I want to set permissions to one folder in such a way that the user can write files or create folder inside that but should not able to delete it.
Basically reason behind this is i am using Pidgin Messenger. There is a directory of logs in which, when user chat its store his logs.... (2 Replies)
Introduction
I have seen some misinformation regarding Unix file permissions. I will try to set the record straight. Take a look at this example of some output from ls:
$ ls -ld /usr/bin /usr/bin/cat
drwxrwxr-x 3 root bin 8704 Sep 23 2004 /usr/bin
-r-xr-xr-x 1 bin bin ... (6 Replies)
Hello,
If you are interested in security, check out this new directory of unix and linux related software tools.
Security - Links
If you have any of your favorite tools, feel free to add them to the directory. (0 Replies)
I work for a big company and all the people within my unit share a common drive to save documents to. I am listed in the group(AMS group) that has access rights to folders within this drive. but i'm trying to restrict access to a confidential folder so that only I can access it.
when I set the... (0 Replies)
Hello,
What does the following mean in terms of file permissions.
-rw-rwSrw- 1 owner group 999 May 25 2004 file_name
What does the "S" stand for.
Thanks in advance for your input. :) (3 Replies)
I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
setaudproc(2) System Calls Manual setaudproc(2)NAME
setaudproc() - controls process level auditing for the current process and its decendents
SYNOPSIS DESCRIPTION
controls process level auditing for the current process and its decendents. It accomplishes this by setting or clearing the flag in the
area of the calling process. When this flag is set, the system audits the process; when it is cleared, the process is not audited. This
call is restricted to users with the privilege.
One of the following flags must be used for aflag:
Audit the calling process and its decendents.
Do not audit the calling process and its decendents.
The flag is inherited by the descendents of a process. consequently, the effect of a call to is not limited to the current process, but
propagates to all its decendents as well. For example, if is called with the flag, all subsequent audited system calls in the current
process are audited until is called with the flag.
Further, performs its action regardless of whether the user executing the process has been selected to be audited or not. For example, if
is called with the (or the flag, all subsequent audited system calls will be audited (or not audited), regardless of whether the user exe-
cuting the process has been selected for auditing or not.
Due to these features, should not be used in most self-auditing applications. should be used (see audswitch(2)) when the objective is to
suspend auditing within a process without affecting its decendents or overriding the user selection aspect of the auditing system.
Security Restrictions
Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege.
Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about
privileged access on systems that support fine-grained privileges.
RETURN VALUE
Upon successful completion, returns 0; otherwise, it returns -1 and sets to indicate the error.
AUTHOR
was developed by HP.
SEE ALSO audevent(1M), audusr(1M), audswitch(2), getaudproc(2), audit(5), privileges(5).
setaudproc(2)