07-21-2008
I think it was just a mistake - maybe someone tried to log on using a wrong name or thinking he/she was going connect to another box. A login attack would look like login spam in your logs, I think.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
here is the picture:
a website on server1 & a "username" logged in that site.
The same username has a shell(nologin)/ftp/samba/mail(qmail) acount on server2.
i have s form on server1 that can pass the username & its NEW password to a sript that should change all passwords on server2.
the... (5 Replies)
Discussion started by: veskonedev
5 Replies
2. HP-UX
Hi all,
I know this issues has been discussed multiple times, i have gone through many such discussion but unfortunately i am still not able to solve the issue being faced.
I have configured the sendmail.cf with the smtp host name (Editing the entry starting with DS...)
Post that restarted... (7 Replies)
Discussion started by: chpsam
7 Replies
3. Web Development
I have a wordpress site that authenticates against a local ldap database for users to login. On the same server and domain I have subsonic installed that also authenticates against the same ldap database. The ldap database is firewalled front the outside wall and the internal LAN.
I would like... (3 Replies)
Discussion started by: barrydocks
3 Replies
4. Shell Programming and Scripting
This is my script structure
main script calls configure script which needs to be run as a different user and the configure script calls my application installation script. the application instruction script prompts the user for a directory which I need to pass from my main or configure script.
... (4 Replies)
Discussion started by: cmastays
4 Replies
5. Red Hat
Hi Friends,
I set up the sendmail in my perosnal home lab. I am using mutt to send the email in between the machines. Everything is working fine if i send email like <username>@<hostname>. Now i set up the MX record for my domain "home.com" and then i was trying to send the email to like... (2 Replies)
Discussion started by: Rohit Bhanot
2 Replies
6. Shell Programming and Scripting
Hi Everyone,
1) I really cannot figure out how to pass multiple user inputs in a script. really need your help re this. below is the script.
-----------
#!/bin/sh
# script name: ask.sh
echo "Enter name: \c"
read NAME
echo "Your name is $NAME\n"
echo "Enter age: \c"
read AGE
echo... (5 Replies)
Discussion started by: mcoblefias
5 Replies
7. Shell Programming and Scripting
Is it possible to open an executable file and pass user credentials through the
perl script. If yes Please do share the CPAN module names and the way to access the executable file.
For eg. I want to open the IBM LOTUS Sametime through my perl code
and pass the user credentials like... (1 Reply)
Discussion started by: giridhar276
1 Replies
8. Solaris
Hello All,
I am currently running a Solaris 10 machine as inbound SMTP server i.e. bringing Emails from outside into our company. In /var/spool/mqueue , I have mails that are pending for the past 4-5 days. They are not being delivered and are causing my mount point size to increase.
Error... (0 Replies)
Discussion started by: Junaid Subhani
0 Replies
9. Cybersecurity
Hello,
I have a linux based streaming server and I do not want to make it public. I am looking for a solution to make my streaming content secured with username & password for each individual.
If i had been dealing with a webpage application, it would have been easy for me: To create .htpasswd... (5 Replies)
Discussion started by: baris35
5 Replies
10. Shell Programming and Scripting
Hello,
I am new to awk and I am trying to figure out how to print an output based on user input.
For example:
ubuntu:~/scripts$ steps="step1, step2, step3"
ubuntu:~/scripts$ echo $steps
step1, step2, step3
I am playing around and I got this pattern that I want:
... (3 Replies)
Discussion started by: tattoostreet
3 Replies
AC(8) BSD System Manager's Manual AC(8)
NAME
ac -- display connect time accounting
SYNOPSIS
ac [-d | -p] [-t tty] [-w file] [users ...]
DESCRIPTION
If the file /var/log/wtmp exists, a record of individual login and logout times are written to it by login(1) and init(8), respectively. The
program ac examines these records and writes the accumulated connect time for all logins to the standard output.
Options available:
-d Display the connect times in 24 hour chunks.
-p Display individual user totals.
-t tty Only do accounting logins on certain ttys. The tty specification can start with '!' to indicate not this tty and end with '*' to
indicate all similarly named ttys. Multiple -t flags may be specified.
-w file Read raw connect time data from file instead of the default file /var/log/wtmp.
users ... Display totals for the given individuals only.
If no arguments are given, ac displays the total amount of login time for all active accounts on the system.
The default wtmp file is an infinitely increasing file unless frequently truncated. This is normally done by the daily daemon scripts sched-
uled by cron(8), which rename and rotate the wtmp files before truncating them (and keep about a week's worth on hand). No login times are
collected, however, if the file does not exist.
For example,
ac -p -t "ttyd*" > modems
ac -p -t "!ttyd*" > other
allows times recorded in modems to be charged out at a different rate than other.
The ac utility exits 0 on success, and >0 if a fatal error occurs.
FILES
/var/log/wtmp connect time accounting file
/var/log/wtmp.[0-7] rotated files
SEE ALSO
login(1), utmp(5), init(8), sa(8)
HISTORY
An ac command appeared in Version 6 AT&T UNIX. This version of ac was written for NetBSD 1.0 from the specification provided by various sys-
tems' manual pages.
BSD
April 19, 1994 BSD