Q&A
Q1: | In Chapter 28, “Command-Line System Administration,” I learned about cron. Using the find commands in this chapter, can I create a cron task that automatically searches for new SUID or SGID binaries periodically? |
A1: | Yes, this is an ideal use of the cron system and shell scripting, and a good exercise to help you learn the ins and outs of both. |
Q2: | I have read other Linux security guides on the Web that recommend securing the su command by editing a file in the /etc/pam.d directory. What's the difference between implementing wheel using permissions and implementing wheel using PAM? |
A2: | The su command can be used to become any user for whom you have a valid password, not just the root user. The /etc/pam.d method of restricting su access allows ... |
Get SAMS Teach Yourself Red Hat® Fedora™ 4 Linux® All in One now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.