Q&A

Q1:In Chapter 28, “Command-Line System Administration,” I learned about cron. Using the find commands in this chapter, can I create a cron task that automatically searches for new SUID or SGID binaries periodically?
A1: Yes, this is an ideal use of the cron system and shell scripting, and a good exercise to help you learn the ins and outs of both.
Q2:I have read other Linux security guides on the Web that recommend securing the su command by editing a file in the /etc/pam.d directory. What's the difference between implementing wheel using permissions and implementing wheel using PAM?
A2: The su command can be used to become any user for whom you have a valid password, not just the root user. The /etc/pam.d method of restricting su access allows ...

Get SAMS Teach Yourself Red Hat® Fedora™ 4 Linux® All in One now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.