On Sun, 30 Jan 2000, Mike Lewis wrote:
>
> Thanks Bret & Steve, but this brings on another question.
>
> Aren't you saying that you have no confidence in your firewall, and all
> those updates you installed from RH ?
>
> I agree Steve, if you're brain dead enough to type in your password when it
> is asking for your username, then changing the perms would not be a sane
> idea.
>
> Ok, if changing the perms is a bad idea, then what are alternatives ?
>
> Mike
>
Depends on what your purpose is for watching the log files. If you just
want to keep an eye on suspicious activity, look into something like
logcheck. That way only suspicious stuff ends up in an email to you.
If you are at the console all the time, setup syslog to dump everything to
a virtual console and check that as needed. Something like:
*.* /dev/tty12
will dump everything to VC 12 (left ALt+F12 to get there unless in X where
you want lALT+CTRL+f12).
Bill Carlson
------------
Systems Programmer [EMAIL PROTECTED] | Opinions are mine,
Virtual Hospital http://www.vh.org/ | not my employer's.
University of Iowa Hospitals and Clinics |
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.