>On 1999-10-16T10:46:01,
> Xie Hua Gang <xhg@gem.ncic.ac.cn> said:
>
>> http://gem.ncic.ac.cn/~xhg/lids/
>> http://www.soaring-bird.com.cn/oss_proj/lids/
>
>> It can protect the important file from being changed. Any one include
>> Root
>> can not change the protected files or diretory and its sub-diretory .
>
>How is this different from immutable files (as supported by ext2) and
setting
>the securelevel to non-zero?
>
>I see it is independent of the fs, which is good. But it should be possible
to
>activate the security level at runtime.
>
Yes, It active the security level at runtime by default , unless it is
turn down
by setting "security=0" when LILO appears.
.
>However, I admit that as soon as it has logging support it will be useful.
It
>will not prevent modifying the files though, unless you also disable access
to
>the raw device.
I am now working on the logging now.. I think it may include the uid/gid of
user who
violate the rules and the command he want to make , etc.
>
>
>--
>Lars Marowsky-Br閑 http://lars.maro \ geek, BOFH, psychopath, magician, /
> lars@marowsky-bree.de wsky-bree.de/ \ killer, looney, genius, pervert /
>pgp-key-id: 0x09e360c5 / ff 2a 82 e8 6b 85 79 23 9c da b5 81 d4 fc 29 e6
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/