On Tue, 13 Apr 2010, Aleksey Tsalolikhin wrote: > You might want to look into process accounting - this way you'll have > a record of > all processes, including any commands ran. Might be too much data for you to > sift through...
Yeah, that would be way too much. This isn't a situation where there is a problem with a malicious user, just one that did something to cause the system to misbehave and can't remember exactly what. Command line logging with a timestamp is quite adequate for this situation. -- Matt It's not what I know that counts. It's what I can remember in time to use. _______________________________________________ Tech mailing list [email protected] http://lopsa.org/cgi-bin/mailman/listinfo/tech This list provided by the League of Professional System Administrators http://lopsa.org/
