How to find who fingered my username


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers How to find who fingered my username
# 1  
Old 04-01-2006
How to find who fingered my username

Hi Everyone,

Whenever someone uses the finger command against my username, he.she gets my info. Is there a way to find who ran the command against my username, somewhat like a log file for the finger command. I would be greatful if someone to clear my query.

Regards
Anirudh Koul
http://cs.dal.ca/~koul
http://360.yahoo.com/anirudhkoul
# 2  
Old 04-03-2006
Other than looking in someone's hist file there is really no way. You could write a finger wrapper or a finder daemon to watch who is calling the finger command. There is no simple way to do it. I've never heard of it if there is.
# 3  
Old 04-03-2006
generally speaking there's no way to do so unless you want to grep shell history files (because in a case of NIS it uses YPs), however you can prevent the info be provided at all in a future, you can set "~/.nofinger" file in your home directory and it will reject user's existance from any requests that come from network. You also can change the info, finger will provide by "chfn" command. Get "UNIX Essentials and Core" DVD if you have questions like that.
# 4  
Old 04-06-2006
layers upon layers

How to stop someone from snooping around and getting your info through either finger or some sort of port scanning has been the bane of many administrator's existence. Currently, there are informal debates going on everyday in either think tanks and brainstorming meetings of the big software developpers to small groups of techies gathering at a starbucks to students at some college campus pondering what to do about it all. Some of the more popular solutions being pitched to and fro by either:

A Ghosting/Masking your IP address so your system is not find-able. You can either do this by buying some software from a retailer like Best Buy for example, but they're not 100% effective. Or you can direct your bandwidth/ traffick through a third party proxy-- You can get the privoxy filtering freeware for example from www.privoxy.com or http://sourceforge.net/project/showf...group_id=11118 I use it and it's really good. My port scanning attacks did not go away completely but they did reduce severely. The problem with being on a Lan like Roadrunner is that people may find it easier to hack you because you're all on the same network.

B Designing a software or firewall that hacks back the hacker breaking into your computer; but that's actually very illegal right now. There are actually freeware utilities out there that can actually take down the domain of the person hacking you; but remember, those are illegal and it'll get you in trouble with the FCC-- it's kind of like a felony. Some of these freeware utilities have malicious code that override the BIOS and do all manner of nasty things to the offending system, I even found one this one time that suppossedly was able to overclock the hacker computer so as to make the chip burn out. If you feel tempted to look for them you will probably find them but do not downloadthem and do not use them. You're only asking for trouble. Using them could cause unimaginable demage to all manner of networks and computers (like taking down a domain) and the FCC would definitely notice something like this. It's a felony of BIBLICAL proportions. You wanna stay away from those, resist the desire for retaliation. Why do you want to know who fingered you? What if you could trade off 'not knowing who did it' for being 'safe'? You can be safe in the internet and the answer is layering.

C Layering upon layering of security I think is the best wy to go. Not only would you have piece of mind that your system is well camouflaged, youll know that what you are doing is completely legal.
Cisco has some servers and routers that defend themselves from attacks,
and although not all of us can afford a cisco router, thgat would be the best way to go. What I do is I have 3 software firewalls running simultaneously (Sygate, Norton, and Black Ice), plus a small inexpensive router, and a hardware firewall, AND I use privoxy = )

Now, hardware firewalls and small routers can be expensive, but the one I use is pretty cheap. This is the one I have http://www.netgear.com/products/details/FR114P.php
and here's where you can get it http://netgear.pricegrabber.com/sear...artnum=FR114P/

And this one http://www.netgear.com/products/details/DG834G.php
And here's where to buy it http://netgear.pricegrabber.com/sear...partnum=DG834G

I hope this helps Smilie
Robert
 
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Why does "ps -[u|U] username" not list processes when username is numeric?

Greetings, The title pretty much says it all. I've snooped everywhere and can't find anything on this. Since our organization went to numeric usernames, using the u|U option for ps returns no processes. Example passwd entry: 320074:DjZAJKXun8HBs:10129:6006:Joe Y:/cadhome/analysis/jy:/bin/bash... (4 Replies)
Discussion started by: crimso
4 Replies

2. Post Here to Contact Site Administrators and Moderators

Change username

Hi.. I want to change my username, is there any way by which I can do it? Thanks in advance.. (3 Replies)
Discussion started by: laxmi Sharma
3 Replies

3. UNIX and Linux Applications

grep file to find unique instances of username

hello - A SystemOut.log file has recurring entries that follow this format: Principal: auth9.nick.al.gov:389/USERNAME Over the course of a day thousands of lines similar to this are produced, with each username represented hundreds of times. I need to create a new file that shows... (4 Replies)
Discussion started by: 1075FJ40
4 Replies

4. Post Here to Contact Site Administrators and Moderators

username

Is it possible to change my username in this site or is thre a way to delete my account and then create a new one with a diffrent user name (2 Replies)
Discussion started by: floresr
2 Replies

5. UNIX for Dummies Questions & Answers

Easy Script, just to find the given username if is it online or not

hey guys plz help me..with shell script. i must find the given(the user types a username) username if is it login or not.. i know how to do it logically, but i think that i can't in scripting. Thank you all (5 Replies)
Discussion started by: aintour
5 Replies

6. Shell Programming and Scripting

To find the username in /etc/passwd file

Hi, I need to a shell script to list out only the username in the /etc/passwd file. Regards Siva (7 Replies)
Discussion started by: gsiva
7 Replies

7. Shell Programming and Scripting

Find username of user running the script

Hello All, If I have a simple cgi script and want to find the name of the person accessing the page, is it possible? How do I get the name of this user? Please help. I was trying a vague method but it doesn't seem to work with all browsers and versions ... $val=$ENV{'HTTP_COOKIE'}; $name... (1 Reply)
Discussion started by: garric
1 Replies

8. UNIX for Dummies Questions & Answers

Find, make and move file based on username

hi there, i'm new to UNIX( just 3month used), i found my new box contained alot of files and directories in /home/box/ i've tried to search script in tis forum and found many of them but, i don't know how to combine them to make a script, although using pipes. my tasks are: 1) to scan user... (5 Replies)
Discussion started by: Helmi
5 Replies

9. Shell Programming and Scripting

Get username in script

how would i go about getting the username of the person currently logged in, and then using the username in a shell script? i've tried variations of user=whoami , 'whoami' , $whoami , and none of the above work :( lol I'd like to get the username to then mount a network share such that the... (9 Replies)
Discussion started by: willc0de4food
9 Replies
Login or Register to Ask a Question