On Tue, March 30, 2010 11:01 am, Walter wrote:
> Hi, all. Despite my lack of response (sorry), I've been
> working on a security program. Right now it uses auth.log
> to identify failed login attempts via telnet, ftp, and (of
> course) ssh. I'm planning on "hard coding" this unless
> someone tel
:Hi,
:
:I was going to try out the latest snapshot but got this error
:
:$ ls -l DragonFly-i386-LATEST-ISO.iso.bz2
:-rw--- 1 sgeorge users 151715205 Mar 25 09:45
:DragonFly-i386-LATEST-ISO.iso.bz2
:$ bunzip2 DragonFly-i386-LATEST-ISO.iso.bz2
:bunzip2: DragonFly-i386-LATEST-ISO.iso.bz2 is not a
Jeremy C. Reed wrote:
See mtree. It can be used to periodically check if files changed. It can
create a specification which lists the files and attributes and then
later you can use mtree to compare the actual files with that previous
specification.
Thanks, obviously someone else had a simila
On Tue, 30 Mar 2010, Walter wrote:
> And I'm thinking it'd be good to check if any of the system
> programs are changed - check the date-time stamp and size.
> These sorts of things can be done on a low rate periodic
> interval.
See mtree. It can be used to periodically check if files changed. It
Hi, all. Despite my lack of response (sorry), I've been
working on a security program. Right now it uses auth.log
to identify failed login attempts via telnet, ftp, and (of
course) ssh. I'm planning on "hard coding" this unless
someone tells me I should look at other log files too.
I'm working
On Tue, Mar 30, 2010 at 11:02 AM, Matthew Dillon
wrote:
> Oh, another thing. If setting up two drives you will want to
> configure the second pretty much the same as the first, including
> giving it its own /boot, its own swap partition, etc, so you can
> swap drives if the primary di