K.S. Bhaskar on 1 Sep 2007 14:29:04 -0000


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] shell script help...

  • From: "K.S. Bhaskar" <bhaskar@bhaskars.com>
  • To: "Philadelphia Linux User's Group Discussion List" <plug@lists.phillylinux.org>
  • Subject: Re: [PLUG] shell script help...
  • Date: Sat, 1 Sep 2007 10:28:59 -0400
  • Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; b=TLYX8E1o/4R+aEIgEYOHYz0FaAAZEdw+9XoH7AiDT7bnGbSK0Z6A4ER5icOfGVmnN8TJ3NQJiXVt6yMpybRICwDY5ApKZj7q5guXze5tOJZ8WbKqn34bpFONQKjIe4Kvpe1t3LS7oofGvxTSEptcugeUyv/xSJrK9pmM09hU/V4=
  • Reply-to: Philadelphia Linux User's Group Discussion List <plug@lists.phillylinux.org>
  • Sender: plug-bounces@lists.phillylinux.org

On 9/1/07, Mag Gam <magawake@gmail.com> wrote:
> Would wrapping "script" do better user auditing? or are there any downsides
> for that?

[KSB] I still don't understand what you are trying to accomplish.  An
approach based on script can be used to keep tabs on honest and / or
unsophisticated users.  If you are protecting against or detecting
sophisticated users who may be trying to do something they don't want
you to know about, this approach is far short of what is needed.

What problem are you trying to solve?

Regards
-- Bhaskar
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug