Hi James , I forgot to mention the 'trap' command. I use this utility on my Unixware 7 boxes , to prevent users from gaining access to the system using the 'delete' key , which by sending a SIGINT will cause the same effect as the CONTROL C in Linux. The trap command is normally a Bash builtin in Linux ( At least with RH 6.2 anyhow )
Here is how you could prevent that kind of break-in : Right at the top of the .bash_profile file : insert the following command : trap ' ' 2 3 ( If you really want to , you could reset the defaults again using trap 2 3 ) For all of those more paranoid users , you could add a few more extra signal numbers to the 2 and 3 above. In Unixware 7 , you cannot trap the 9 signal , and I assume that the same applies for Linux. When it comes to Linux and Unix , I am probably the biggest idiot on this mailing list , but I do imagine that the trap command will make things a little tougher for all of those CONTROL C users .... Regards , Jason ----- Original Message ----- From: "James P. Roberts" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, October 28, 2002 8:42 PM Subject: Re: Menu security > <snip> > > I have a simple script which running a menu as below when i logon as > > user "abc" > > > > A. Check Hard Disk Space > > B. Check Mem Info > > C. Check CPU Info > > > > What my question is how can I configure this user "abc" can only > access > > to this menu. > > > <snip> > > Look into using a chroot jail for this user. The other answer you got > earlier, about executing the script automatically at login was valid, > but not secure. All the user would have to do is hit control-C (or the > like) to escape from the login shell (before it finished executing and > logged out), and then would have normal access. You can specify the > login shell for that user within /etc/passwd. Set up an alternate > "secure shell" for such users, which will chroot them to a safe place, > where they can only execute the set of commands you include inside the > chroot jail. > > Regards, > Jim > > > > _______________________________________________ > Seawolf-list mailing list > [EMAIL PROTECTED] > https://listman.redhat.com/mailman/listinfo/seawolf-list _______________________________________________ Seawolf-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/seawolf-list
