On Tue, 13 Apr 2010, Aleksey Tsalolikhin wrote:

> You might want to look into process accounting - this way you'll have
> a record of
> all processes, including any commands ran.  Might be too much data for you to
> sift through...

Yeah, that would be way too much.  This isn't a situation where there is a 
problem with a malicious user, just one that did something to cause the 
system to misbehave and can't remember exactly what.  Command line logging 
with a timestamp is quite adequate for this situation.

-- Matt
It's not what I know that counts.
It's what I can remember in time to use.
_______________________________________________
Tech mailing list
[email protected]
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to