Security procedures

Suggestions for making your system secure

Login logging
    loginlog
        Enabling login logging
    Last login time
    Recording su use

Checking file characteristics

Creating reference files

Check set-UIDs
    Before you begin
    Example: checking set-UIDs

Check set-UIDs by filesystem
    Before you begin
    Example: checking set-UIDs by filesystem

Checking file privileges
    Example: checking file privileges