Hi Ian, > We have a set-up that uses "rbash". The client gets "rbash" as a > login shell and his path is preset to a directory that has a few > chosen executables in it.
Most interesting. Sounds like it would do just what I want. I'm on to it. > I suspect a determined hacker could get around this, but it > discourages most abusers. <sigh> We can only try. If they do get out I still try and catch 'em with Firewall rules, hashed log files, Tripwire, Snort packet sniffing/logging. Plus those trusty back ups come in handy sometimes :-) Many thanks, Best regards Rudi.