HiI am sniffing using ettercap on my network and it is working fine for the. Iptables v1.3.8: can't initialize iptables table `nat': Permission denied (you must be root). I had to change the uid guid to 0 in the /etc/etter/conf file.
I was trying to solve this problem myself recently. I found the answer within the audit.rules manpage: Examples The following rule shows how to audit failed access to files due permission problems. Note that it takes two rules for each arch ABI to audit this since file access can fail with two different failure codes indicating permission problems.a always,exit -F arch=b32 -S open -S openat -F exit=-EACCES -k access -a always,exit -F arch=b32 -S open -S openat -F exit=-EPERM -k access -a always,exit -F arch=b64 -S open -S openat -F exit=-EACCES -k access -a always,exit -F arch=b64 -S open -S openat -F exit=-EPERM -k access.
No, in stock configurations there isn't anything that directly shows 'user bibby was denied access to /root' You might be able to find auditing software that may have enhanced auditing or maybe software (like SeLinux) that uses more complex ACL access to files and it may log things, but even Windows doesn't log such permission errors (there are utilities with Sysinternals that show on-the-fly access denied errors for Windows, though). I don't think I've even run across any utilities similar that that functionality in Unix systems. You can try looking for 'incidental' things in logs, like mail or web server programs that log errors trying to access particular file paths that as an administrator you know should be there. If you're interested in security on your system to keep pesky users from acting pesky, you can try some of the utilities listed and see if they will help you.
I want to be able to view log files from apache as regular user. I have set this files to 777 as root but still cannot view them as regular user, why is that?
The directory should be 750, not 664. Also, you should add the user to the adm group. That's actually largely the point of the adm group: reading logs. Permissions on directories are a bit different than on files. Download yasin bahasa indonesia versi cdr dietitian. To simplify a bunch, a directory is a list of names and addresses: the name is the filename, the address is the actual location of the file. The x permission controls access to this list: in order to look up the address of a specific file, you need the execute bit on its parent directory, and on that directory's parent, etc.
Symbian s60 3rd edition. Using Nokia SDK emulator requires registration (at least for Symbian S60 3rd ed.
The r permission then controls listing files: If you have -x, you can access a file if you know its name, but you can't ls. Lastly, w controls creating, renaming, and deleting files. So, in order to access a file, you always need the x bit. Also: DON'T set the log files to 777.
They should be 644 or 640, one of the two. Two reasons: one, they're not executable, so the x bit should be off. Second, more importantly, normal users should never be writing to Apache log files, only reading. That's a potential security hole in the server.