Sponsored Content
Top Forums UNIX for Dummies Questions & Answers How to trace root's activity log Post 302387719 by ross.mather on Monday 18th of January 2010 05:13:58 AM
Old 01-18-2010
Which version of Unix are you using? How do people authenticate against root, do they all use su or do they login directly as root?
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Run non-root script as root with non-root environment

All, I want to run a non-root script as the root user with non-root environment variables with crontab. The non-root user would have environment variables for database access such as Oracle or Sybase. The root user does not have the Oracle or Sybase enviroment variables. I thought you could do... (2 Replies)
Discussion started by: bubba112557
2 Replies

2. UNIX for Dummies Questions & Answers

I need it to prompt me for a root password, so I don't have to log as root

Hi folks, I'm trying to install a program, and I want to place some of the executables into /usr/bin so that they can be executed from any folder on the computer. I've been giveng the root password, but told never to log in directly as root. Instead, I can wait for a password prompt. However, I... (2 Replies)
Discussion started by: lunchtime
2 Replies

3. AIX

how to log DNS activity?

I have DNS server with AIX 5.2 and need help in logging DNS activity to a file, in other words, I want to log the information of all the machines that resolves via DNS server along with their timestamp (like what time it resolved). Any help is very much appreciated. Thanks (3 Replies)
Discussion started by: mbak
3 Replies

4. Solaris

Making a Log of user activity in Solaris 10

My first post. I need a simple way to log user activity to a unique file for each user and also if any user su's to root, I would like to capture that activity and have it in the unique file for that user. (1 Reply)
Discussion started by: powerrack
1 Replies

5. Solaris

Log Trace

Hi I would like to display only error messages from my log files while monotring application on my solaris box using tail command. Is there other way we can monitor please let me know? In general # tail -f "xyz.log' ---> this will display current activity of the logs, instead i would like... (4 Replies)
Discussion started by: gkrishnag
4 Replies

6. SuSE

How to log Installation-Activity ??

Hi @ All, short question: i want to log my cpan Installation in a text-File. My first try was cpan -i module | tee /home/install.txt but this donīt logs my inputs, eg. what i typed in when cpan asks where are my progs or which mirror i want. Can somebody help me with this? Regards, ... (1 Reply)
Discussion started by: jackcracker
1 Replies

7. Solaris

Migration of system having UFS root FS with zones root to ZFS root FS

Hi All After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies

8. AIX

Trace su to root

Hi, is it possible to trace everything about user that changes from its own user to root user, failed and successful attempts (I would need user and IP address of user that was trying to do that)? I tried adding auth.notice and auth.info in syslog.conf but it only tracks user withoud IP... (6 Replies)
Discussion started by: sprehodec
6 Replies

9. Red Hat

Network activity log

I am having Red Hat Linux 5.9 installed in my server. There are 2 physical ethernet port in the server and these 2 ports are bonded to 1 bond0 port through linux bonding utility. For some days I am experiencing some fluctuation in server port. I want to analyze the same.How to do that? It may... (4 Replies)
Discussion started by: Anjan Ganguly
4 Replies
SECURETTY(5)						     Linux Programmer's Manual						      SECURETTY(5)

NAME
securetty - file which lists terminals from which root can log in DESCRIPTION
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmis- sion of certain authentication tokens. It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the shadow suite. On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are accepted. FILES
/etc/securetty SEE ALSO
login(1), login.defs(5), pam_securetty(8) COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. Linux 2015-03-29 SECURETTY(5)
All times are GMT -4. The time now is 10:59 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy