Pick a Free OS

User login


Securing Linux: Part 2

requires you to ensure that file permissions are properly set.

Restrict access to log directory and syslog files for normal users using

the following commands.

bash# chmod 751 /var/log /etc/logrotate.d

bash# chmod 640 /etc/syslog.conf /etc/logrotate.conf

bash# chmod 640 /var/log/*log

We have briefly covered many aspects that will help you make your Linux box

more secure. We hope in time you develop a concept of security. There are

a few more articles lined up in this series, but the contents of those

depend on the feedback that we get from you. Contact us.