08-30-2014
Quote:
Originally Posted by
scj2012
Understood. But if you are a security administer you aren't going to look through every user history file plus it should show up in the ks file.
So what? The keystroke log contains the keystrokes that were entered; not how those keystrokes were evaluated by whatever application was reading those keystrokes.
10 More Discussions You Might Find Interesting
1. Linux
Don't you just hate crackers?
Ok, I have a user on my server who is always causing trouble. He is constantly trying to get into files, change stuff, get users passwords, etc. I was wondering if Linux has a built in keystroke log, or event log of some sort that I may use to track his movements. ... (4 Replies)
Discussion started by: Phobos
4 Replies
2. UNIX for Dummies Questions & Answers
Hi,
How to track/trap the keyboard strokes in the script
say for eg, in normal scene, when a script is running, if a press control c, the program gets terminated...
so in this case, how do i trap the keystrokes so as to avoid the abort of the program..
pls help (1 Reply)
Discussion started by: vasikaran
1 Replies
3. HP-UX
Hi,
I wonder if anyone is able to assist me.
I have a HP UX server and some HP UX workstations that has been migrated from another network. I have changed the IP Addresses and everything seems to be working fine.
However, the users are complaining that they are unable to login to the UX... (1 Reply)
Discussion started by: michaelgim
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I need to modify some entries in LDAP, but with what keystroke do I exit and apply the changes?
Thanks
Brissix (0 Replies)
Discussion started by: brissix
0 Replies
5. Solaris
Hello
I am unable to enter my password because the OS does not respond to my keystrokes in the password field at the log-in menu, even though it does in the username field. I have no clue how to troubleshoot this. Please help me out.
Thank you (11 Replies)
Discussion started by: dai2809
11 Replies
6. Shell Programming and Scripting
Hello All,
I wounder if any one know if perl have the ability to run script in the background which record each keyboard keystorke?
If yes , how can I implement the part which reading the keyboard keystroke?
Is there any moudle that handle it ?
Thanks a head
Alalush (1 Reply)
Discussion started by: Alalush
1 Replies
7. Cybersecurity
Hi all,
Does anyone know if there is a tool in the market that could do the following when System Admin log to the server as root and perform activities according to his change request:
- trap or log his keystroke for the entire duration
- provide a report on the changes SA has made to the... (3 Replies)
Discussion started by: mohzub
3 Replies
8. Shell Programming and Scripting
Hi All ,
I am writing a shell script for a 3D test case . The 3D Test case involves the user to press some keys to see the changes in the 3d test case . The user has to press p , r , a , z etc to observe the changes on screen .
Now please let me know how can i implement the keystroke p , a ,... (1 Reply)
Discussion started by: dskonnur
1 Replies
9. UNIX for Dummies Questions & Answers
i have the below script:
#!/bin/bash
echo "enter a"
read a
echo "enter b"
read b
let c=a+b
echo $c
at any point of time between entering the value for a and b,if user presses ctrl+a key combination, then it should start from the beginning(the script should be restarted).
it should... (4 Replies)
Discussion started by: pandeesh
4 Replies
10. Linux
When unlocking a Linux server's console there's no event indicating successful logging
Is there a way I can fix this ?
I have the following in my rsyslog.conf
auth.info /var/log/secure
authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
THINK(1) General Commands Manual THINK(1)
NAME
think - you don't have to think, the computer can think for you
SYNOPSIS
think [ -detach ]
DESCRIPTION
Think simulates a thinking brain.
This can be useful if someone is not wanting to think at invocation time or if someone is needing some thinking about something. It can
also be helpful if someone's brain is not working correctly at invocation time.
When invoked, think will go ahead and look at all of the commands and keystrokes that a user has made during the current login session.
Think will then look at what files the user has. From this and what level the user is listed at in the file /usr/lib/think, think will
figure out what the user was trying to do when think was invoked.
DEVICES
The process that think uses to help a user is greatly aided if the user is wearing a brain interface bus (bib) device. A bib device is
normally worn on the head, and if being used, then think will try to see what was going through the users head at the time of invocation.
After think does this, it will send electric signals to the users brain, causing the user to type in whatever keystrokes are necessary to
accomplish the task that he/she doesn't want to think about.
OPTIONS
-detach
also known as "Must mother do all of your thinking for you?"-mode. This options causes think to run in the background as a daemon
that watches for users who look like they may need assistance. When a user is found to be exercising cluelessness, think will lock
up their keyboard and will proceed to execute what seems to be the most likely sequence of commands that the user had intended to
execute. This flag may only be used by the super-user.
FILES
/dev/brain
bib device special file.
/usr/lib/think
file to indicate various user abilities. The format of this file is a username on each line followed by some whitspace and then a
number. The higher the number for a given user, the more likely think is to assume that that user knows what he/she is doing.
Unfortunately, what think considers a large number will vary with usage.
BUGS
If a user is using a bib device and actually lacks a brain of their own, then there is a high risk that think will take over their (non-
existent) minds. This has the upshot that someone other than the user will have to stop the program. (Perhaps this is a feature.)
It may illegal in some areas to force users to wear bib devices.
AUTHOR
This man page was written by John Guthrie <guthrie@math.upenn.edu> with suggestions from Kevin Whyte <kwhyte@math.upenn.edu> for the
alt.sysadmin.recovery man page collection.
think version 1.0 April 5, 1996 THINK(1)