02-19-2016
Hi,
some of these information can also be found under /var/adm.
But it depend on your system configuration.
User login, logout, failed login, etc:
/var/adm/authlog or who /etc/security/failedlogin
Boot, shutdown, reboot:
Binary file /var/adm/wtmp which can be read by the command last, e.g.: last boot,last reboot,last shutdown
Regards
This User Gave Thanks to -=XrAy=- For This Post:
10 More Discussions You Might Find Interesting
1. Solaris
How can you control old system logs keep(or storage) time in Solaris ? Is there any method ? it depends on buffer size long or date long ? (1 Reply)
Discussion started by: xramm
1 Replies
2. AIX
Hi All,
I would like to know where's the location of ALL system error logs on AIX43 and AIX53.
Thanks,
itik (1 Reply)
Discussion started by: itik
1 Replies
3. AIX
Dear Gurus
I am running AIX with several users that are using the system, i would like to monitor the commands that are run by these users. Is there a log system that records the commands that are executed by the users???
Any kind of help will be appreciated.
Regards
Masquerder (6 Replies)
Discussion started by: masquerer
6 Replies
4. AIX
Hi all,
We (AIX) currently mount to a ZFS on the Mainframe. When one of our local users wants to transfer a file to the Mainframe, they must first run binary MVSLOGIN passing user name and password. Our mainframe will be retired soon and business processes will be transferring to an... (2 Replies)
Discussion started by: cruiser
2 Replies
5. Solaris
I am working on a SUN T2000 machine with Solaris 10 running on it. When I checked the system this morning, I found it to be turned off. The lastreboot command showed that the system had been shut down the previous night.
I want to find out how the system was shut down. I have run hardware health... (2 Replies)
Discussion started by: batman727
2 Replies
6. AIX
good evening all
dear all where i can find the system logs in AIX 5.3 (1 Reply)
Discussion started by: thecobra151
1 Replies
7. Shell Programming and Scripting
Hi Friends,
I am new to this , I am working on AIX system and my scenario is to retrive the files from remote system and remove the files from the remote system after retreving files. I can able to retrieve the files but Can't remove files in remote system. Please check my code and help me out... (3 Replies)
Discussion started by: vinayparakala
3 Replies
8. Red Hat
This isn't a RedHat specific question. The software in question might be used for any Linux distribution. Would it be advisable or inadvisable for my application, to be downloaded by many people I don't know, to write to the following logs in /var/log?
maillog or mail.log
messages
secure
... (10 Replies)
Discussion started by: Brandon9000
10 Replies
9. AIX
I have a following requirement in production
system 1 : LINUX
User: abcd
system 2: AIX (it is hosting a production DB)
Requirement
user abcd from system 1 should have read access on archive log files created by DB on system 2. The log files are created with permissions 540 by user ora ,... (2 Replies)
Discussion started by: amitnm1106
2 Replies
10. UNIX for Beginners Questions & Answers
I have to enable sftp and scp daemon logs in AIX 7.1. Currently only ftp daemons are being logged. What are the steps for doing so? Also programs such as filezilla uses sftp service to log into AIX. How do I ensure that sftp/scp continues to function after making change? Also needs to know what... (3 Replies)
Discussion started by: pregmi
3 Replies
passwd(4) Kernel Interfaces Manual passwd(4)
NAME
passwd - Password files
DESCRIPTION
A passwd file is a file consisting of records separated by newline characters, one record per user, containing seven colon (:) separated
fields. These fields are as follows:
User's login name. The default length is 8 characters. User's encrypted password. User's ID User's login group ID General information
about the user User's home directory User's login shell
The name field is the login used to access the computer account, and the uid field is the number associated with it. They should both be
unique across the system (and often across a group of systems) since they control file access.
While it is possible to have multiple entries with identical login names and/or identical user gid's, it is usually a mistake to do so.
Routines that manipulate these files will often return only one of the multiple entries, and that one by random selection.
The login name must never begin with a hyphen (-); also, it is strongly suggested that neither uppercase characters or dots (.) be part of
the name, as this tends to confuse mailers. No field may contain a colon (:) as this has been used historically to separate the fields in
the user database.
The password field is the encrypted form of the password. If the password field is empty, no password is required to gain access to the
machine. Because these files contain the encrypted user passwords, they should not be readable by anyone without appropriate privileges.
Use the command to edit password entries. This ensures that the hashed password database is rebuilt. If you have enhanced security
installed on your system, the password field contains an asterisk (*). The encrypted password is stored in the user's protected password
database.
The gid field is the group that the user will be placed in upon login. Since the operating system supports multiple groups (see the groups
command) this field currently has little special meaning.
The gecos field normally contains comma (,) separated subfields as follows:
User's full name User's office number User's work phone number User's home phone number
This information is used by the finger command.
The user's home directory is the full UNIX pathname where the user will be placed on login.
The shell field is the command interpreter the user prefers. If the shell field is empty, the Bourne shell (/bin/sh) is assumed.
The allowable values for the UID are unsigned numbers from 0 to 65535.
The command pwck can be used to verify the accuracy of data entered in the passwd file.
EXAMPLES
root:TZVtfX5VbS3KY:0:1:System PRIVILEGED Account,,,:/:/bin/sh adm:*:5:16:Admin Login:/usr/adm:/bin/sh operator:HdgoklKwZOlvU:25:28:System
PRIVILEGED Account,,,:/etc/operator: guest:Nologin:-2:-2:anonymous NFS user:/:/bin/date osfuser:If2eoZ6gmghJo:50002:15:Osf
User:/usr/users/osfuser:/bin/csh marcy:*:201:20:Marcy Swanson,dev,x1234:/usr/users/marcy:/bin/sh
RELATED INFORMATION
Functions: getpwent(3)
Commands: login(1), passwd(1), pwck(8), vipw(8)
Files: prpasswd(4) delim off
passwd(4)