Language Selection

English French German Italian Portuguese Spanish

Configure Local and Remote System Logging : Ubuntu

Filed under
HowTos

A linux machine has a logging system which keeps track of what everything is doing. Anytime you authorize with sudo it gets logged. Anytime you (or someone else) connects via ssh it gets logged. Apache logs connections, mail servers log emails sent and refused. Pretty much everything keeps a log of what it is doing so you can later troubleshoot it or simply have a record of it.For those that are security minded it may not be a bad idea to keep duplicate of your logs by sending them not only to the local machine but to a remote machine as well. This way, even if an attacker is able to get into the first machine his steps are logged remotely before he is able to clear them on the local machine. This, of course, has a number of other valuable uses. In any event, here are a few quick steps to set it up.

/etc/syslog.conf

This file is the main “what gets logged and where” file for your system. If you take a look at it you’ll see that it takes different types of logs and writes them to the appropriate files. Mail here. Cron there. etc. We can easily tell the system to send the logs elsewhere with the following:

More Here.




More in Tux Machines

Comparing live version upgrade methods

When I review a distribution I always begin by performing a fresh installation of the operating system. This gives the latest version of the project a chance to stand on its own without complications. However, many of us do not perform fresh installations on our operating systems each time we want to upgrade to the latest release. Some of us, in order to preserve settings or installed packages, prefer to upgrade our existing operating system without starting over from scratch. This week I decided to take five open source operating systems through an upgrade process from their penultimate release to their latest version. Read more

Porteus Kiosk 4.0 Modular Linux Web Kiosk Released, Drops Chrome 32-bit Support

Porteus Solutions' Tomasz Jokiel announced on May 30, 2016, the release of the final Porteus Kiosk 4.0.0 Web Kiosk operating system based on the latest GNU/Linux technologies and open-source software. Porteus Kiosk 4.0.0 comes three months after the release of the last maintenance build in the Porteus Kiosk 3.x series, introducing numerous new features and improvements. But first, let's take a quick look under the hood, as the OS is now powered by Linux kernel 4.4.11 LTS (Long Term Support), and it's based on the Mozilla Firefox 45.1.1 ESR and Google Chrome 50.0.2661.102 web browsers. Read more

Fresh 10-Way GeForce Linux Benchmarks With The NVIDIA 367.18 Driver

In prepping for our forthcoming GeForce GTX 1070 and GTX 1080 Linux benchmarking, I've been running fresh rounds of benchmarks on my large assortment of GPUs, beginning with the GeForce hardware supported by the NVIDIA 367.18 beta driver. Here are the first of those benchmarks with the ten Maxwell/Kepler GPUs I've tested thus far. Earlier this month I posted the With Pascal Ahead, A 16-Way Recap From NVIDIA's 9800 GTX To Maxwell but in still waiting for my GTX 1070/1080 samples to arrive, I've restarted all of those tests now using the newer 367.18 driver as well as incorporating some extra tests like the recently released F1 2015 for Linux, not having done any SHOC OpenCL tests in a while, etc. Read more

Arch Linux-Based ArchAssault Ethical Hacking Distro Changes Name to ArchStrike

The team over at ArchAssault, a GNU/Linux operating system based on the famous Arch Linux distro and designed for ethical hackers, announced a few minutes ago on their Twitter account that they are changing the OS' name to ArchStrike. Designed from the ground up as a security layer to Arch Linux, the ArchAssault project provides security researchers and hackers with one of the most powerful open source and totally free Linux kernel-based operating system for penetration testing and security auditing operations. Read more