05-08-2008
For the first question : use who or finger and you'll see who's logged. For the second - how is the access policy organized - controlled by which application or audit control in your case ? We can't be aware of the policy your organization is using or have applied on your servers.
7 More Discussions You Might Find Interesting
1. Linux
Hi,
I want to know the command for finding out the list of active/disabled users in Linux System.
Model:x86_64. Rev:2.6.9
Thanks in advance for your help
Mike (1 Reply)
Discussion started by: Mike1234
1 Replies
2. AIX
Hi all,
I am new to HACMP. So sorry for the newie question. But I did search the forum and it seems that no one asks this before.
So if a 2-node cluster runs in active-active mode (and the same application), what is the benefit of using HACMP ?
If it runs in active-stanby, it is easy to... (9 Replies)
Discussion started by: qiulang
9 Replies
3. UNIX for Dummies Questions & Answers
Hello,
I've configured an user authentication against Active Directory (Windows Server 2008 R2) on AIX V6 with LDAP. It works fine.
And here's my problem:
How can I control ldap user permissions on the local AIX machine?
E.g. an AD user should be able to write all files of local sys... (1 Reply)
Discussion started by: xia777
1 Replies
4. Solaris
Hi,
I need to configure 4 ip address (same subnet and mask) in one ipmp group (two interfaces) in an active active formation (link based). Can some one provide the steps or a tutorial link.
Thanks (2 Replies)
Discussion started by: Mack1982
2 Replies
5. AIX
First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful.
As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies
6. Shell Programming and Scripting
#!/bin/bash
for digit in $(seq 1 10)
do
if ping -c1 -w2 192.168.1.$digit &> /dev/null
then
echo "192.168.1.$digit is UP"
else
echo "192.168.1.$digit is DOWN"
fi
done (3 Replies)
Discussion started by: fusetrips
3 Replies
7. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Send a fortune to all active/logged in users
2. Relevant commands, code, scripts, algorithms:
So I understand... (8 Replies)
Discussion started by: kjcraig77
8 Replies
LEARN ABOUT LINUX
safe_finger
SAFE_FINGER(8) Linux Programmer's Manual SAFE_FINGER(8)
NAME
safe_finger - finger client wrapper that protects against nasty stuff from finger servers
SYNOPSIS
safe_finger [finger_options]
DESCRIPTION
The safe_finger command protects against nasty stuff from finger servers. Use this program for automatic reverse finger probes from the
tcp_wrapper (tcpd) , not the raw finger command. The safe_finger command makes sure that the finger client is not run with root privileges.
It also runs the finger client with a defined PATH environment. safe_finger will also protect you from problems caused by the output of
some finger servers. The problem: some programs may react to stuff in the first column. Other programs may get upset by thrash anywhere on
a line. File systems may fill up as the finger server keeps sending data. Text editors may bomb out on extremely long lines. The finger
server may take forever because it is somehow wedged. safe_finger takes care of all this badness.
SEE ALSO
hosts_access(5), hosts_options(5), tcpd(8)
AUTHOR
Wietse Venema, Eindhoven University of Technology, The Netherlands.
Linux 21th June 1997 SAFE_FINGER(8)