Software :: Secure Log File Entries Not Appearing In LogAnalyzer

Oct 4, 2010

I am testing LogAnalyzer 3.0, with several Linux servers configured to send their log files to the central server. All Linux servers use syslog as the daemon of choice. While it does appear that LogAnalyzer to be working somewhat, I noticed that a particular log file present on all servers, secure, does not have any entries appearing at the central server. The configuration of the secure file, via the /etc/syslog.conf file, on all servers is shown below:

Code:
# The authpriv file has restricted access.
authpriv.* /var/log/secure

Do I need to make any additional modifications to the syslog.conf or any other file?

View 4 Replies


ADVERTISEMENT

Software :: Automatic Report Generation By LogAnalyzer

Oct 14, 2010

I am running LogAnalyzer 3.0 on one of our servers, and I wanted to know if anyone knows of a way it can be configured to generate reports that can be exported and e-mailed to the System Administrator?

View 1 Replies View Related

OpenSUSE Install :: Keep Getting .gvfs (gnome Virtual File System) File Appearing As Corrupt In /~/usr Directory

Jun 24, 2011

Why do I keep getting .gvfs (gnome virtual file system) file appearing as corrupt in /~/usr directory, I can get rid of it by unmounting, but it re-appears later on. It is causing problems as it interrupts my backups (which are automated) with an error message,ListError .gtk-bookmarks/.gvfs [Errno 13] Permission denied: '/home/jimt/.gvfs'

drwxr-xr-x 2 jimt users 4.0K Jun 22 22:00 .gstreamer-0.10
-rw-r--r-- 1 jimt users 132 Jun 24 11:50 .gtk-bookmarks
d????????? ? ? ? ? ? .gvfs
-rw------- 1 jimt users 4.3K Jun 24 11:50 .ICEauthority
drwxr-xr-x 3 jimt users 4.0K Jun 23 08:41 .icedteaplugin

View 7 Replies View Related

Ubuntu Installation :: Downloaded File Just Appearing On Desktop?

Sep 29, 2010

Alright, so I followed the step by step instructions from this page: [URL]. When I downloaded the file, the file appeared on my desktop as an unknown file with the name "ubuntu-10.04.1-desktop-i386". I thought this was strange because it didn't have the ".iso" after it. I tried looking for a download location for the file that would give me a .iso file, but whenever I download the file it just appears on my desktop as "ubuntu-10.04.1-desktop-i386". After that, I downloaded Infra Recorder, and followed those instructions. Everything was going fine and when the progress bar hit 100%, Infra Recorder gave me some kind of error.

I can't recall exactly what it said, but it said to check the log file or something like that. I wasn't sure what to do at this point, so I tried installing Ubuntu anyway. I rebooted with the CD and it took me to the burgundy screen and it started to load, but then the installation crashed to an MS DOS screen with some gibberish that I didn't understand. Obviously the CD I wrote didn't have all of the installation files it needed. What should I do? Is there something wrong with the file that I downloaded? My computer is a Dell Vostro 200 and I am running Windows XP.

View 8 Replies View Related

General :: Which File Has The Main Menu Entries

Apr 15, 2011

I want to edit the Main menu to regroup the applications, and change the paths of some of them.. I have done some yum install and remove, but the entries in the main menu are still present.=

View 3 Replies View Related

Server :: Many Entries In DHCPD Lease File

May 10, 2011

I've a question about how work dhcpd. I'm on CentOS 5.6. I has a dhcpd server on it. His configuration:

authoritative;
ddns-update-style none;
deny declines;
deny bootp;

option domain-name "mydomain.domain";
option domain-name-servers IP;
option routers IP;
option time-offset -18000;
#option ntp-servers IP;

subnet IP netmask MASK {
range IP START IP END ;
default-lease-time 86400;
max-lease-time 172800; }

And now in the /var/lib/dhcpd/dhcpd.lease file, there few entrie for the same IP. Sometime I've ten same entries for the same IP. Can I have only one entrie by IP? Is there any problems in my configuration of my dhcpd.conf file?

View 10 Replies View Related

Programming :: Loop To Process Entries In A File?

Jul 9, 2010

I hade created a file with following text entries.

content of fileitems.txt
kdeaccessibility-4.4.92
kdeadmin-4.4.92
kdeartwork-4.4.92
kdebase-4.4.92

How do I read the file one line at a time and so its ready to do something with that line.

View 3 Replies View Related

Security :: Ways To Secure Sendmail Or Secure Alternatives To Send Mail

Dec 1, 2010

I'm an Oracle DBA and started working for my current employer about 4 months ago. This past weekend an alert re: FS space brought my attention to /var/spool/clientmqueue (full of mail re: cron jobs) and the fact that sendmail is not running on our Linux servers.I'm told that the IT security team deemed sendmail too vulnerable so we don't run it.Aside from FS filling up and missing notification of issues with crontab entries, I'm concerned that we may be missing notification of potential issues. In other Unix/Linux environments I've seen emails from the print daemon when it experienced problems with specific jobs.

Are there other Linux facilities aside from cron and lpd that use email to advise the users of possible issues? Are there ways to secure sendmail or secure alternatives to sendmail? My primary need/desire is to make sure that emails regarding issues on the server get to the appropriate users. Secondary goal would be to have the ability to use mailx to send mail out. There is No need/desire to receive mail from outside.

View 1 Replies View Related

OpenSUSE :: Kontact Mail Not Recognising Entries In The Contact File?

Apr 1, 2011

I just started using Kontact and have imported all my contact details from Thunderbird.This worked OK, but I find that when I start a new email and begin to type the recipient's name, the email address is not automatically pulled from the contact list as I would expect.I also noticed that there doesn't appear to be a 'Send Email' option in the Contact screen once an entry has been selected.Kmail seems to be collecting email addresses from any emails I send, and if I start typing one of these, then it does auto-complete

View 9 Replies View Related

Security :: Can I Change Entries In Inode Table Of A File (Linux)

May 19, 2011

Anyone, I would like to ask if it was possible to change the entries of a file's inode table ?

For example

Code...

I was wondering if I can change the entries in this inode table's entries.
For example I want to change the "Modify" entry ? I want it to reflect to day 2009-05-19 for example.

Can i do it ?

View 13 Replies View Related

Server :: Adding Entries Directly In Password Shadow File

Mar 11, 2011

I am working on building a customized ISO image of a server based on linux. The thing is after the server is installed and run for the first time, three users have to be created for the various services to run properly. I want this to be automated. To achieve this what is was thinking is automatically enter the user entries in the /etc/passwd and /etc/shadow files through init scripts when the server starts for the first time after the installation. I tried creating user and assigning password in one of my machine, and the /etc/passwd and the /etc/shadow entries of this user I copied it into the other machine and tried login in on the other machine and everything worked fine. How I am trying to achieve this.

View 1 Replies View Related

Ubuntu Security :: Secure File Transfer

Feb 4, 2010

If I need to get a file to someone I could place it on the server and somehow automate an email telling them there is a file available. They could login to the server based on their email address and a randomly generated key combination and down load the file.I also need it to preform the same function going the other way. Login into my server and place files going to me.

View 2 Replies View Related

Ubuntu Security :: Missing Secure.log File?

Jul 11, 2010

I seem to be missing a secure.log or security.log file. have Ubuntu 10.04 and can't find this file. I looked in the /var/log and ran a search command to no avail. Does anyone know where this file is or is it called something else.looking for a file that logs any change to the security settings of the system.

View 6 Replies View Related

Server :: My /var/log/secure File Is Not Getting Updated With Ssh Logins?

Jul 17, 2010

my /var/log/secure file is not getting updated with ssh logins from yesterday.Even the login from my own ip is not updated.

View 2 Replies View Related

Ubuntu :: Make Shell Script To Delete Selected Entries Of A Log File?

Jun 26, 2010

I have 2 external hdd in wich I have all my files.... yesterday, I have copied all the files from hdd1 to hdd2 and I want to eliminate duplicates so I used FSLint to find them, now, I have a txt file that looks like this code...

now I want to make a shell script to delete all the files/entries (read from the log file) that begin with code...

View 2 Replies View Related

General :: How To Add Entries / How To Delete Entries

Oct 13, 2010

I am working on Red Hat Linux since last six months and learning it steps by steps. like configurating ftp server,NSF ,DNS and then email server. I want to learn squid server but technically before going into it what you suggest me that may I first learn to configure Linux as a router,Firewall machine or do IP masquerading on a server. Because all these things are directly or indirectly involve in squid.So guide me because going to start squid i may understand Linux IP table ,how to add entries in it,how to delete entries ,I think you understand my point which i want to ask for guidence.

View 4 Replies View Related

Ubuntu Security :: How Secure Are The Default File Permissions

Feb 5, 2010

What do the default file permissions in ubuntu 9.10 protect/deny access to?

View 9 Replies View Related

Ubuntu Servers :: Secure File Server Setup

Dec 29, 2010

I am going to set up a file server on Ubuntu. I have searched a while, but can't seem to find a guide to what I want. The requirements specifications are the following:File server: possible to upload, change and download files.Linux (Ubuntu) clients, Windows clients if possible.Access restriction to deny access to other than registered users.Only the user should be able to read the content of the files.Ideally root should not be able to see the individual files, but in worst case it is ok for root to see the files.Root should not be able to open the files.Point 1-3 is easy to find out how to set up. But I can't seem to find a way to deny root to view the files. The only solution I can think of is to encrypt files or a whole folder, but I don't know how to set it up.

The setup is for a home network, but the server used as a file server will have a web server as well. If someone manages to get access to the server I don't want them to be able to read the files.

View 5 Replies View Related

Ubuntu Servers :: How To For Secure Web Based File Hosting

May 5, 2011

Know any documentation or software packages to do a open source "File Hosting" or also known as "one-click hosting" server.I want to create my own private secure site to easily have clients download sensitive files. If it could be setup to use SSL that would be great.

View 1 Replies View Related

General :: File Share Security The Setup Is Not Secure At All?

Jan 7, 2010

Been messing around with Ubuntu 9.1 for the last few weeks and am loving it so far. Been trying to get in the terminal and learn a little something, to no avail. LOL I have been googling and searching the site today for info on networking. My Linux box is a desktop, with my main HDD mounted with music, and movies and some other stuff. My intent is to network the two laptops in the house (Windows XP and Windows 7) to the Linux box so I can listen to my music and watch movies when not in the office. I have found some info, mostly involving Samba, and plan to install Samba tonight and fiddle with it. My issue was with security. I have read a few posts and they talk about the fact that if you share files in this manner, the set up is not secure at all. Is this something i should really be concerned about? If the folders I share only have my music and videos in them,

View 4 Replies View Related

General :: Secure FTP Of A File To The Root Directory On CentOS?

Nov 2, 2010

I am running WHM and CPANEL on centos.I would like to upload a file to the root user directory. To be honest, my only experience uploading and downloading files with FTP has been with domain related accounts that were set up under WHM to be managed under CPANEL. This is quite simple, because all you do is set FileZilla or Dreamweaver up with the FTP address of the domain account and the username and password.How can I do something similar to FTP a file into the root or home directory?

View 1 Replies View Related

Red Hat :: Connecting To Server For File Transfer Using GFtp Is Secure

Nov 21, 2010

if connecting to my server for file transfer using gFtp is secure. I told gFtp to connect to the server using SSH2 and it works. It says it uses this command "ssh -e none -l wordpress -p 1883 IPADDRESS -s sftp." Is this more or less secure then using ftpes or ftps? What I thought was weird was that I could shutdown vsftpd and still connect. Does SSH2 SFTP use its own ftp server?

View 4 Replies View Related

Ubuntu Multimedia :: Cp All The File Entries In This Playlist From Their Various Original Directories And Into One Target Directory?

Jun 14, 2010

I've got a few large, unsorted folders where I dump mp3s. I manage it all through rhythmbox and I've decided to separate the wheat from the chaff by paring down stuff I don't want and throwing all the desirable stuff into a big (~1,800 file) playlist file saved to my desktop.My question to you is, is there a hack that'll let me cp all the file entries in this playlist from their various original directories and into one target directory? Playlist format is:

Quote:
[playlist]
X-GNOME-Title=Biglist
NumberOfEntries=1823[code].....

View 3 Replies View Related

Security :: Track IPsec Module's Operations / Find Such A Log File - Entries In System?

Feb 25, 2009

How can I track IPsec module's operations? Can I find such a log file or entries in Linux?

View 1 Replies View Related

Ubuntu :: Secure Copy: Overwrite Remote File With Sudo?

Mar 18, 2011

My situation:

Host A: need sudo to access the file
Host B: need sudo to access/overwrite the target file

How to copy a file from host A to host B without creating temporaries? Is it possible?

View 1 Replies View Related

Networking :: Connection Closed By UNKNOWN Entry In Secure Log File

Oct 14, 2010

Several of our servers that do not have direct exposure to the Internet have the following entry appearing in their respective /var/log/secure files.Are these messages harmless? If so, is there any way or reason to suppress their appearing in the log files?

View 1 Replies View Related

Server :: How To Store Password In Encrypted File / Retrieve It In Secure Mode?

Jul 14, 2011

there are some configuration files where linux require the password of application user, to do something.how can i to encrypt the password in these files? Or how can i to store that password in encrypted file and retrieve it in secure mode?

View 2 Replies View Related

Security :: Secure And Automated Backups - Add Public Key To Authorized_hosts File On Prod Server?

Mar 13, 2010

I'm trying to find a secure way to backup files on my Prod Server to Backup Server. It must be automated, so I will need to run a command with cron which will login to Prod Server from Backup Server and backup data. 1. Do you think it would be secure enough to do this by creating an passwordless RSA private key on Backup Server and adding it's public key to authorized_hosts file on Prod Server? I can't think of a way to Automate this without having to enter any passwords without passwordless RSA key. Is there another. more secure way? 2. Should I create a special user for backup, which will only have read access to all files in the directory that I am backing up? If so, How can I run a check that this new backup user indeed has read access to ALL files in the folder that I intent to back up? How can I ensure the backup process will not skip files due to some permission problem? 3. I'm thinking of using rsnapshot tool, which uses rsync.

View 10 Replies View Related

Security :: Secure CGI File In Apache - Authentication By Entering The Predefined Username And Password

Sep 24, 2010

Im using opennms network configuration backup server called 'RANCID'.It run on top of RHEL5 system and using APache. Here's the link which i'm accessing [URL] But any one can access this URL and obtain my configuration files

I want to secure this using a logon page.allow login Only for the successful authentications by entering the predefined username and password But after get authenticate book marking the above URL still can access anyone since it didnt prompt username and password again In eachtime executing the above url it should direct to authenticate page

View 5 Replies View Related

Security :: Missing A Secure.log Or Security.log File

Jul 11, 2010

I seem to be missing a secure.log or security.log file. I have Ubuntu 10.04 and can't find this file. I looked in the /var/log and ran a search command to no avail. Does anyone know where this file is or is it called something else. I'm looking for a file that logs any change to the security settings of the system.

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved