|[Home] [Credit Search] [Category Browser] [Staff Roll Call]||The LINUX.COM Article Archive|
|Originally Published: Wednesday, 9 August 2000||Author: Alexander Reelsen|
|Published to: news_enhance_security/Security News||Page: 1/1 - [Std View]|
SCSLog 2.1 released
SCSLog logs security related systemcalls like setuid(), setgid(), setreuid(), setregid() etc. In addition, dangerous use of systemcalls could be logged, i.e. making files SUID/SGID, world-writeable, insecure use of tmp files (sym link attacks) and so on.