Re: process accounting

mark.securityfocus_at_winksmith.com
Date: 05/28/03

  • Next message: kathya6200_at_yahoo.com: "securing a bridget"
    Date: Wed, 28 May 2003 13:39:12 -0400
    To: Gergely Czuczy <phoemix@harmless.hu>
    
    

    On Wed, May 28, 2003 at 04:57:23PM +0200, Gergely Czuczy wrote:
    > you're not absolutely right. there are ways to log _everything_. by now,
    > i'm using grsecurity for a while and there are logging capabilities for
    > everything, chroots, chdirs, execve calls, (un)mounts, and so on.

    what technique does grsecurity use? i would think that the
    only way would be to log system calls. essentially, an strace.

    -- 
    Mark Smith
    mark at winksmith dot com
    mark at tux dot org
    

  • Next message: kathya6200_at_yahoo.com: "securing a bridget"