there's no chance of a rootkit (i guess you mean a
cracker's kit) since it's not connected to the net.
the linux security how-to didnt help me much. that's
why i was looking for a single line command that sets
things right. sometime back i secured a user's home
directory by such a command read in a book and tested
it by trying to enter it as another user. it worked
fine. but the root directory must have to be dealt in
a different way, i guess...

- Diwakar

--- Devdas Bhagat <[EMAIL PROTECTED]> wrote: > On
Sat, 26 May 2001, Diwakar Ranganathan spewed into
> the ether:
> > > What is wrong with their accessing directories
> in /?
> >
> > hmm... would you as root allow the users in your
> > network access /bin and do something funny that
> you'll
> Exactly what are the permissions on /bin? If it is
> anything other than 
> root:root 0755, you have a bigger problem on your
> hands. Like a rootkit.
> 
> > have to change the system settings or something
> > serious like that in order to keep the machine
> going?
> Only root has write access to /bin.
> 
> > they have access to their own /home and floppy and
> > cdrom directories. 
> Don't forget $TMPDIR, and $TMP.
> 
> Devdas Bhagat
> -- 
> Imagination is more important than knowledge.
>               -- Albert Einstein
> 
> _______________________________________________
> linux-india-help mailing list
> [EMAIL PROTECTED]
>
http://lists.sourceforge.net/lists/listinfo/linux-india-help


=====
GNU/Linux, for technical and ethical reasons.

____________________________________________________________
Do You Yahoo!?
Get your free @yahoo.co.uk address at http://mail.yahoo.co.uk
or your free @yahoo.ie address at http://mail.yahoo.ie

_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to