DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 
Security procedures

Check set-UIDs

Check for suspicious programs that have the set-UID bit set, particularly to IDs such as root, sys, bin, and mail.


Next topic: Before you begin
Previous topic: Creating reference files

© 2004 The SCO Group, Inc. All rights reserved.
UnixWare 7 Release 7.1.4 - 22 April 2004