And possibly you should think about "chatter" on files such as history files and the 
like.
Also you may want to consider redirecting all log file messages specified in 
/etc/syslog.conf to a remote system
for example:
Replace *.info;mail.none;news.none;authpriv.none                                
/var/log/messages
with this:
*.info;mail.none;news.none;authpriv.none                                
@remote_system_name

Additionally if NFS is used, automount will allow you to keep a record of who and when 
people log on.

-----Mike

"W. Reilly Cooley" wrote:

> On Thu, Sep 07, 2000 at 04:19:38PM -0700, kort wrote:
> >
> > Reinstalling will fix any currently hacked services, but that
> > will just require the vandal to re-infect the system.
>
> Not necessarily.  Only a complete wipe and re-install will.  Otherwise,
> you need to use 'lsattr' to make sure that none of your files have
> the immutable bit set, which will cause trojaned binaries to not be
> overwritten.
>
> Wil
> --
> W. Reilly Cooley, Esq.                 [EMAIL PROTECTED]
>
> _______________________________________________
> Redhat-devel-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-devel-list

--
Michael Waite                                           Mission Critical Linux
Senior Professional Services Consultant                 100 Foot of John Street
978-606-0349            office                          Lowell, MA. 01852
978-376-4677            cell                            [EMAIL PROTECTED]





_______________________________________________
Redhat-devel-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-devel-list

Reply via email to