Security procedures

Check set-UIDs

Check for suspicious programs that have the set-UID bit set, particularly to IDs such as root, sys, bin, and mail.


Next topic: Before you begin
Previous topic: Creating reference files

© 1999 The Santa Cruz Operation, Inc. All rights reserved.
UnixWare 7 Release 7.1.1 - 5 November 1999