etc/Securetty

 
Thread Tools Search this Thread
Operating Systems Linux Red Hat etc/Securetty
# 1  
Old 07-30-2012
etc/Securetty

Hey,

Can someone help me with what the vcx and console entries in /etc/Securetty file are? I understand that tty is the terminal that we usually login to using Ctrl+Alt+Fx. Not sure of the vcx and console entries.
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

What are pseudo-tty devices? Is my /etc/securetty file contains any?

Hi , I have searched wiki for pseudo tty devices but it was very complex for me to understand. Can any one help me understanding concept behind pseudo-tty in layman language? According to security manual of our org /etc/securetty files shouldn't have any pseudo tty devices. i understand ttyX... (5 Replies)
Discussion started by: pinga123
5 Replies
Login or Register to Ask a Question
last(1) 						      General Commands Manual							   last(1)

NAME
last, lastb - indicate last logins of users and ttys SYNOPSIS
file] [name ...] [tty ...] file] [name ...] [tty ...] DESCRIPTION
The command searches backwards through the file (which contains a record of all logins and logouts) for information about a user, a tty, or any group of users and ttys. Arguments specify names of users or ttys of interest. The names of ttys can be given fully or abbreviated. For example, is the same as If multiple arguments are given, the information that applies to any of the arguments is printed. For example, lists all of sessions as well as all sessions on the console terminal. The command prints the sessions of the specified users and ttys, most recent first, indicating when the session began, the duration of the session, and the tty on which the session took place. indicates if the session is still in progress or if it was cut short by a reboot. The pseudo-user logs each time the system reboots. Thus, is a useful command for evaluating the relative time between system reboots. If is interrupted, it indicates how far the search has progressed in If interrupted by a quit signal (generated by a Ctrl-), indicates how far the search has progressed, then continues the search. The command searches backwards through the database file to display bad login information. Access to should be restricted to users with appropriate privileges (owned by and readable only by because it may contain password information. Options The and commands recognize the following options and arguments: (none) If no arguments are specified, prints a record of all logins and logouts in reverse order, most recent first. When used with and displays the user's host name as it is stored in the files and respectively. The host name is displayed between the tty name and the user's login time. Limits the report to number of lines. Use file as the name of the accounting file instead of or Use file as the name of the accounting database instead of This option should be used along with the option. Display the fields in long format if this flag is used along with the flag. Without the flag, normal output is displayed. AUTHOR
was developed by the University of California, Berkeley and HP. FILES
Bad login database Login database New login database New bad login database SEE ALSO
login(1), utmp(4), wtmps(4). last(1)