Securing Linux: Part 2
Email:
requires you to ensure that file permissions are properly set.
Restrict access to log directory and syslog files for normal users using
the following commands.
bash# chmod 751 /var/log /etc/logrotate.d
bash# chmod 640 /etc/syslog.conf /etc/logrotate.conf
bash# chmod 640 /var/log/*log
We have briefly covered many aspects that will help you make your Linux box
more secure. We hope in time you develop a concept of security. There are
a few more articles lined up in this series, but the contents of those
depend on the feedback that we get from you. Contact us.
- « first
- ‹ previous
- of 6