there's no chance of a rootkit (i guess you mean a
cracker's kit) since it's not connected to the net.
the linux security how-to didnt help me much. that's
why i was looking for a single line command that sets
things right. sometime back i secured a user's home
directory by such a command read in a book and tested
it by trying to enter it as another user. it worked
fine. but the root directory must have to be dealt in
a different way, i guess...
- Diwakar
--- Devdas Bhagat <[EMAIL PROTECTED]> wrote: > On
Sat, 26 May 2001, Diwakar Ranganathan spewed into
> the ether:
> > > What is wrong with their accessing directories
> in /?
> >
> > hmm... would you as root allow the users in your
> > network access /bin and do something funny that
> you'll
> Exactly what are the permissions on /bin? If it is
> anything other than
> root:root 0755, you have a bigger problem on your
> hands. Like a rootkit.
>
> > have to change the system settings or something
> > serious like that in order to keep the machine
> going?
> Only root has write access to /bin.
>
> > they have access to their own /home and floppy and
> > cdrom directories.
> Don't forget $TMPDIR, and $TMP.
>
> Devdas Bhagat
> --
> Imagination is more important than knowledge.
> -- Albert Einstein
>
> _______________________________________________
> linux-india-help mailing list
> [EMAIL PROTECTED]
>
http://lists.sourceforge.net/lists/listinfo/linux-india-help
=====
GNU/Linux, for technical and ethical reasons.
____________________________________________________________
Do You Yahoo!?
Get your free @yahoo.co.uk address at http://mail.yahoo.co.uk
or your free @yahoo.ie address at http://mail.yahoo.ie
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/linux-india-help