Ramanraj K wrote on Thu, Jan 08, 2004 at 09:30:58PM +0530:
,----
| In SuSE, ulimit parameters can be set with /etc/profile
`----
calling ulimit is one way. Having PAM set the limit before it spawns
a login shell is much more better if the user is going to use a shell
which does not use /etc/profile (or ulimit itself need not be a part
of that shell - as far as I know, its a built-in in most shells).
For doing it through PAM, there is the pam_limits module which helps
you do this. On debian, /etc/pam.d/login lists a nicely documented
pam_limits entry. It explains where limits.conf can be found, etc.,.
,----
| Are there scripts that use many levels of forking for system
`----
I can't think of any scripts that do many-levels of forking and I
can't see why any distro would write scripts that do many-levels of
forking :)
,----
| BTW, what other bombs are there that we should be aware of and guard
| against?
`----
as such 'bomb's, I dont know. But there are lots of ways things can be
exploited. programs that assume a lot of things can generally be
attacked - assuming environment variables, user input, file
permissions, etc.,. can be exploited.
Now I realize this is getting us to a completely a different topic:
secure programming :)
cheers,
-Suraj
--
+--------------------------------------------------<suraj@xxxxxxxxxxx>--+
|The world has no respect for the multitude of |
|have-nots; the wealthy rise to be held in praise |
|(means of wealth - 2), Thirukkural |
+--<http://www.symonds.net/~suraj/>-------------------------------------+