On 2009-Apr-18, at 9:01 AM, Sthu Deus wrote:
Thank You for Your time and answer, Rob:
I
didn't know what shell you use, so I included it just in case.
So, in bash it is useless? And there is no another way of fulfilling
the
subject?
The purpose of `rehash` is to scan your path for new c
Thank You for Your time and answer, Rob:
> I
> didn't know what shell you use, so I included it just in case.
So, in bash it is useless? And there is no another way of fulfilling the
subject?
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". T
On 2009-Apr-16, at 2:05 AM, Sthu Deus wrote:
I get the error:
# rehash
bash: rehash: command not found
Yes, I use tcsh, so that command is necessary for me. I knew it
wouldn't work in bash or ksh, but it wouldn't hurt anything either. I
didn't know what shell you use, so I included it just
Eric Gerlach пишет:
> If you're really paranoid about this, you should consider looking at
> tools like tripwire or samhain. But they take considerably more
> effort to set up.
I wanted to ask a bit more on security issue: should I regenerate the
keys for ssh after it had been updated to new ope
Thank You for Your time and answer, Eric:
> This works in the simple case, the only thing to be aware of is that
> if someone has the ability to change you /usr/bin/sudo, then they can
> probably update the debsum as well (unless debsums are signed... are
> they?)
Is there key point on investigat
Thank You for Your time and answer, Rob:
> On 2009-Apr-15, at 4:02 AM, Sthu Deus wrote:
> % aptitude install debsums
> % rehash
> % debsums sudo
I get the error:
# rehash
bash: rehash: command not found
I've searched for the file at the debian package page - there is no
such a file that is in a
On Wed, Apr 15, 2009 at 08:46:44AM -0400, Rob McBroom wrote:
> On 2009-Apr-15, at 4:02 AM, Sthu Deus wrote:
>
>> For example, I have
>>
>> /usr/bin/sudo
>>
>> that comes from its installed package
>>
>> sudo
>>
>> My question is, How I can find out that the /usr/bin/sudo file has not
>> been exchan
On 2009-Apr-15, at 4:02 AM, Sthu Deus wrote:
For example, I have
/usr/bin/sudo
that comes from its installed package
sudo
My question is, How I can find out that the /usr/bin/sudo file has not
been exchanged with another copy by some person and therefore it does
some stuff that I'm not aware
Good day.
I wonder if there is a way how I can check whither a copy of a file is
the original one from its installed package - just to make sure it is
not corrupted by an evil hand.
For example, I have
/usr/bin/sudo
that comes from its installed package
sudo
My question is, How I can find out
9 matches
Mail list logo