Sponsored Content
Full Discussion: plan
Top Forums UNIX for Dummies Questions & Answers plan Post 10957 by Perderabo on Monday 26th of November 2001 10:14:22 AM
Old 11-26-2001
Please don't try this. It can cause problems. The way it was done was to make .plan a named pipe and leave a program running that was writing to the pipe. The program would notice when a reader to the pipe existed and would start to run.

But if that program died, fingers would just block. If they were remote fingers resources would lock up until the system crashed. This was considered to be a denial of service attack. Most finger programs now will stat .plan and ignore it if it's not a plain file. So you probably can't do this anymore.

Here is a story that you probably won't believe...I know it's true and I can hardly believe it...

In my youth, I once decided to have a little fun with .plan. I set it to "Bus error(coredump)". I thought this was funny, but since I was the sysadm and people only fingered me to get my phone number, they just reported it to me as a bug. Smilie So I upped the ante to "Trolleycar error (core ejected) Deleting all files in current directory...exporting this behavior to all reachable networks!". I felt certain that folks could figure out that this message was bogus... Then I got a call from a guy who said his officemate had just got that message and was racing to the computer room to yank all of the cables out of the system. Smilie Smilie Smilie I stopped him before he did any damage. Then I deleted my .plan and haven't had one since.
 

7 More Discussions You Might Find Interesting

1. What is on Your Mind?

401 Keg Plan

If you had purchased $1,000 of AIG stock one year ago, you would have about $40.00 left. With Lehman, you have about $6.00 left. With Fannie or Freddie, you would have less than $5.00 left. But, if you had purchased $1,000 worth of beer one year ago, and had drunk all of the beer, then turned... (4 Replies)
Discussion started by: Neo
4 Replies

2. Linux

recommendations for a Linux hosting plan?

I'd like to purchase a hosting plan, i found a $3.99 on webhost4life.org, any1 using the package before? (2 Replies)
Discussion started by: BestLinux
2 Replies

3. Filesystems, Disks and Memory

an advice regarding backup plan

Hi all i'm looking for good advice regarding backup plan becuase its first time to me handle large scale database expected to grow up 10000 - 20000 record per year with daily operations on it I'm working as sysAdmin in educational organization ( junior level ) with mixed OSes environment... (3 Replies)
Discussion started by: h@foorsa.biz
3 Replies

4. AIX

Plan to shutdown servers

Hello everyone I need to shutdown all my servers and my storage. I would like to hear your opinions about this. This is my little plan about all this. 1.-Stop the applications 2.-Stop the webservers 3.-Stop the ihs 4.-Stop the databases 5.-Verify no process are running 6.-Close the... (1 Reply)
Discussion started by: lo-lp-kl
1 Replies

5. What is on Your Mind?

Plan to Buy a New Laptop

It is time for me to buy a new laptop computer and i was searching the net for the last few days looking for one. The results haven't really been satisfying and i thought you might have information i lack - if so, i'd be grateful for sharing it with me and the probably interested audience. What... (22 Replies)
Discussion started by: bakunin
22 Replies

6. UNIX for Dummies Questions & Answers

I need a database and a plan of attack!

Hi everyone, I've got an extensive collection of seismic files that I am trying to turn into workable subsurface data collection. It's all real-time history and it is being loaded onto the main linux computer from a collection of about 1000 CDs. There are about 4000 seismic files on each CD, and... (3 Replies)
Discussion started by: ws6transam
3 Replies

7. UNIX for Beginners Questions & Answers

Cpio Restore didnt go to plan

Hello folks, one of the RAID drives in our SCO system crashed recently and being hot swap it was replaced. Problem was that on boot it stops at: Checking protected password and protected subsystem databases.... First I did #authck -a and checked /etc/auth/system/ttys as per instructions in a... (7 Replies)
Discussion started by: Redstar
7 Replies
FINGER(1)						    BSD General Commands Manual 						 FINGER(1)

NAME
finger -- user information lookup program SYNOPSIS
finger [-lmsp] [user ...] [user@host ...] DESCRIPTION
The finger displays information about the system users. Options are: -s Finger displays the user's login name, real name, terminal name and write status (as a ``*'' after the terminal name if write permis- sion is denied), idle time, login time, office location and office phone number. Login time is displayed as month, day, hours and minutes, unless more than six months ago, in which case the year is displayed rather than the hours and minutes. Unknown devices as well as nonexistent idle and login times are displayed as single asterisks. -l Produces a multi-line format displaying all of the information described for the -s option as well as the user's home directory, home phone number, login shell, mail status, and the contents of the files ``.plan'', ``.project'', ``.pgpkey'' and ``.forward'' from the user's home directory. Phone numbers specified as eleven digits are printed as ``+N-NNN-NNN-NNNN''. Numbers specified as ten or seven digits are printed as the appropriate subset of that string. Numbers specified as five digits are printed as ``xN-NNNN''. Numbers specified as four digits are printed as ``xNNNN''. If write permission is denied to the device, the phrase ``(messages off)'' is appended to the line containing the device name. One entry per user is displayed with the -l option; if a user is logged on multiple times, terminal information is repeated once per login. Mail status is shown as ``No Mail.'' if there is no mail at all, ``Mail last read DDD MMM ## HH:MM YYYY (TZ)'' if the person has looked at their mailbox since new mail arriving, or ``New mail received ...'', `` Unread since ...'' if they have new mail. -p Prevents the -l option of finger from displaying the contents of the ``.plan'', ``.project'' and ``.pgpkey'' files. -m Prevent matching of user names. User is usually a login name; however, matching will also be done on the users' real names, unless the -m option is supplied. All name matching performed by finger is case insensitive. If no options are specified, finger defaults to the -l style output if operands are provided, otherwise to the -s style. Note that some fields may be missing, in either format, if information is not available for them. If no arguments are specified, finger will print an entry for each user currently logged into the system. Finger may be used to look up users on a remote machine. The format is to specify a user as ``user@host'', or ``@host'', where the default output format for the former is the -l style, and the default output format for the latter is the -s style. The -l option is the only option that may be passed to a remote machine. If standard output is a socket, finger will emit a carriage return (^M) before every linefeed (^J). This is for processing remote finger requests when invoked by fingerd(8). FILES
~/.nofinger If finger finds this file in a user's home directory, it will, for finger requests originating outside the local host, firmly deny the existence of that user. For this to work, the finger program, as started by fingerd(8), must be able to see the .nofinger file. This generally means that the home directory containing the file must have the other-users-execute bit set (o+x). See chmod(1). If you use this feature for privacy, please test it with ``finger @localhost'' before relying on it, just in case. ~/.plan ~/.project ~/.pgp These files are printed as part of a long-format request. The .project file is limited to one line; the .plan file may be arbitrarily long. SEE ALSO
chfn(1), passwd(1), w(1), who(1) HISTORY
The finger command appeared in 3.0BSD. Linux NetKit (0.17) August 15, 1999 Linux NetKit (0.17)
All times are GMT -4. The time now is 06:50 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy