SCO's Cahn Wants Tanner to Audit the 401(k) Plan

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News SCO's Cahn Wants Tanner to Audit the 401(k) Plan
# 1  
Old 08-14-2010
SCO's Cahn Wants Tanner to Audit the 401(k) Plan

It's hard to think about SCO today, but Cahn continues to file. Now he wants Tanner to audit SCO's 401(k) plan. I'd prefer that he audit all the professionals' bills, personally.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. What is on Your Mind?

401 Keg Plan

If you had purchased $1,000 of AIG stock one year ago, you would have about $40.00 left. With Lehman, you have about $6.00 left. With Fannie or Freddie, you would have less than $5.00 left. But, if you had purchased $1,000 worth of beer one year ago, and had drunk all of the beer, then turned... (4 Replies)
Discussion started by: Neo
4 Replies

2. SCO

Audit in SCO

Hi, everybody My system will be audit in a few weeks and I need to get a list about users accounts (create date/last login/first login) and I would like to extrat this informations in SCO 5.0.5. Exist a command that makes this? Thanks for help me, Tatiana :p (1 Reply)
Discussion started by: tatiana
1 Replies
Login or Register to Ask a Question
audit(2)							   System Calls 							  audit(2)

NAME
audit - write a record to the audit log SYNOPSIS
cc [ flag ... ] file ... -lbsm -lsocket -lnsl [ library... ] #include <sys/param.h> #include <bsm/libbsm.h> int audit(caddr_t record, int length); DESCRIPTION
The audit() function queues a record for writing to the system audit log. The data pointed to by record is queued for the log after a mini- mal consistency check, with the length parameter specifying the size of the record in bytes. The data should be a well-formed audit record as described by audit.log(4). The kernel validates the record header token type and length, and sets the time stamp value before writing the record to the audit log. The kernel does not do any preselection for user-level generated events. If the audit policy is set to include sequence or trailer tokens, the kernel will append them to the record. RETURN VALUES
Upon successful completion, 0 is returned. Otherwise, -1 is returned and errno is set to indicate the error. ERRORS
The audit() function will fail if: E2BIG The record length is greater than the maximum allowed record length. EFAULT The record argument points outside the process's allocated address space. EINVAL The header token in the record is invalid. ENOTSUP Solaris Audit is not defined for this system. EPERM The {PRIV_PROC_AUDIT} privilege is not asserted in the effective set of the calling process. USAGE
Only privileged processes can successfully execute this call. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Committed | +-----------------------------+-----------------------------+ |MT-Level |MT-Safe | +-----------------------------+-----------------------------+ SEE ALSO
bsmconv(1M), audit(1M), auditd(1M), svcadm(1M), auditon(2), getaudit(2), audit.log(4), attributes(5), privileges(5) NOTES
The functionality described in this man page is available only if the Solaris Auditing has been enabled and the audit daemon auditd(1M) has not been disabled by audit(1M) or svcadm(1M). See bsmconv(1M) for more information. SunOS 5.11 16 Apr 2008 audit(2)