10-06-2008
well it would depend, on how the data is logged.
You might be having the user name logged in the log file. Why don;t you grep the log file on that particular user.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi, to do a su - user, we need to know what are the users...
so in unix
1) which file to see the list of users, passwords? (2 Replies)
Discussion started by: yls177
2 Replies
2. UNIX for Dummies Questions & Answers
How to prevent root users from editing files (logs)? Is there any way? (4 Replies)
Discussion started by: vehchi
4 Replies
3. UNIX for Dummies Questions & Answers
Lets say a user starts a process (either a shell script or a Perl script) and before that process finishes, he logs out (either intentionaly or network problems or ...), does the process continu running ?
Default shell is Korn.
This is because at my job (being trained), there are tasks to run... (2 Replies)
Discussion started by: Browser_ice
2 Replies
4. Shell Programming and Scripting
Hello All,
If I have a simple cgi script and want to find the name of the person accessing the page, is it possible? How do I get the name of this user? Please help.
I was trying a vague method but it doesn't seem to work with all browsers and versions ...
$val=$ENV{'HTTP_COOKIE'};
$name... (1 Reply)
Discussion started by: garric
1 Replies
5. Shell Programming and Scripting
I have a ksh script that currently moves a day's worth of log files (about 15,000) files to a different directory. The issue is that about 100 of these files are still open for write when this happens. I need an efficient way to ensure that these files aren't open without doing an lsof on each... (7 Replies)
Discussion started by: nestafaria
7 Replies
6. UNIX for Dummies Questions & Answers
Hi,
when 2 users are logged as root , how can i find witch one had perform witch command?
Thanks, (1 Reply)
Discussion started by: prpkrk
1 Replies
7. Red Hat
Hi, i am a general user of linux but we work mostly on windows next i am moving full time on linux.
here is my question:
We have product which consist or several subsystem each subsystem has one module to create logs file dump. and i am going to write that support dump tool.
we need to... (3 Replies)
Discussion started by: ajayyadavmca
3 Replies
8. UNIX for Advanced & Expert Users
I need to find all the unix user id's of all the users in unix... is there any such command... pl help out (6 Replies)
Discussion started by: Syed Imran
6 Replies
9. Shell Programming and Scripting
Can someone help me with this script.
I have a bunch of files like this:
"2209OS_02_Code" "2209OS_03_Code" "2209OS_04_Code" "2209OS_05_Code" "2209OS_06_Code" "2209OS_07_Code" "2209OS_08_Code" "2209OS_09_Code" "2209OS_10_Code" "2209OS_10_video"
and I want to rename them to be like this:
... (2 Replies)
Discussion started by: siegfried
2 Replies
audusr(1M) audusr(1M)
NAME
audusr - select users to audit
SYNOPSIS
user] ...] user] ...]
DESCRIPTION
is used to specify users to be audited or excluded from auditing. The command only works for systems that have been converted to trusted
mode.
To select users to audit on systems that have not been converted to trusted mode, use the command. See also audit(5), userdbset(1M),
userdb(4), and in security(4).
If no arguments are specified, displays the audit setting of every user. is restricted to privileged users.
Options
recognizes the following options:
Audit the specified
user. The auditing system records audit records to the ``current'' audit file when the specified user executes audited
events or system calls. Use to specify events to be audited (see audevent(1M)).
Do not audit the specified
user.
Audit all users.
Do not audit any users.
The and options are mutually exclusive: that is, if is specified, cannot be specified; if is specified, cannot be specified.
Users specified with are audited (or excluded from auditing) beginning with their next login session, until excluded from auditing (or
specified for auditing) with a subsequent invocation. Users already logged into the system when is invoked are unaffected during that
login session; however, any user who logs in after is invoked is audited or excluded from auditing accordingly.
WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
AUTHOR
was developed by HP.
FILES
File containing flags to indicate whether users are audited.
SEE ALSO
audevent(1M), userdbset(1M), setaudproc(2), audswitch(2), audwrite(2), security(4), userdb(4), audit(5).
TO BE OBSOLETED audusr(1M)