<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Catching users ! in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130346#M152891</link>
    <description>if you use last -R yuo will get the IP@&lt;BR /&gt;&lt;BR /&gt;man last&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jean-Luc</description>
    <pubDate>Thu, 27 Nov 2003 09:49:36 GMT</pubDate>
    <dc:creator>Jean-Luc Oudart</dc:creator>
    <dc:date>2003-11-27T09:49:36Z</dc:date>
    <item>
      <title>Catching users !</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130345#M152890</link>
      <description>I have a situation with one of my users where I believe they are logging in using a different user id to gain greater access to our systems. I really need to see historically where particular users were logged in (using IP address) at a point in time. The 'last' command doesn't seem to give me the IP address where the user was logged in, is there any way I can match an IP address with a user historically ?? I realise it's a long shot but it would be really useful !&lt;BR /&gt;&lt;BR /&gt;Does wtmp hold any valuable info ?&lt;BR /&gt;&lt;BR /&gt;All help rewarded !!!&lt;BR /&gt;&lt;BR /&gt;Thankyou &lt;BR /&gt;Simon</description>
      <pubDate>Thu, 27 Nov 2003 09:47:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130345#M152890</guid>
      <dc:creator>Simon R Wootton</dc:creator>
      <dc:date>2003-11-27T09:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: Catching users !</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130346#M152891</link>
      <description>if you use last -R yuo will get the IP@&lt;BR /&gt;&lt;BR /&gt;man last&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jean-Luc</description>
      <pubDate>Thu, 27 Nov 2003 09:49:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130346#M152891</guid>
      <dc:creator>Jean-Luc Oudart</dc:creator>
      <dc:date>2003-11-27T09:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: Catching users !</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130347#M152892</link>
      <description>As an extra note to the above reply, tracking back to an IP address may not prove anything if the address is part of a DHCP pool.  &lt;BR /&gt;&lt;BR /&gt;If you use static addresses, you should be OK though (unless your users are smart enough to change their IP address too before logging in).</description>
      <pubDate>Thu, 27 Nov 2003 09:54:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130347#M152892</guid>
      <dc:creator>Chris Wilshaw</dc:creator>
      <dc:date>2003-11-27T09:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: Catching users !</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130348#M152893</link>
      <description>This sounds fairly serious so you may need to take drastic actions once you discover the abusers. I would start by changing the password on the compromised login acctounts, notifying the real owner of the account to never share a password and depending on your company's security policy (you do have one don't you?) have appropriate disciplinary action take place. And I would hope that you do NOT have multiple UID=0 accounts on your system! This is the first place that a hacker will try to attack your system. If you need assistance from other users to perform certain sysadmin tasks as root, get a copy of sudo and never give out the root password.</description>
      <pubDate>Thu, 27 Nov 2003 09:56:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130348#M152893</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2003-11-27T09:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Catching users !</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130349#M152894</link>
      <description>On Chris comments,&lt;BR /&gt;It would depend on your "lease"  policy for DHCP and how far back in time you want to track the suer IP@&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jean-Luc</description>
      <pubDate>Thu, 27 Nov 2003 09:58:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130349#M152894</guid>
      <dc:creator>Jean-Luc Oudart</dc:creator>
      <dc:date>2003-11-27T09:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Catching users !</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130350#M152895</link>
      <description>Simon,&lt;BR /&gt;&lt;BR /&gt;Lock,disable or password change the account in question.&lt;BR /&gt;&lt;BR /&gt;See who complains ! Only the owner of the account will shout, and they should be educated about login/password confidentiality.  &lt;BR /&gt;&lt;BR /&gt;Next have a look back at last -R for previous and current logged users and ip address details.  Its a guide but not a fool-proof way of tracking the originator/source&lt;BR /&gt;&lt;BR /&gt;Keith&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Nov 2003 11:44:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/catching-users/m-p/3130350#M152895</guid>
      <dc:creator>Keith Bevan_1</dc:creator>
      <dc:date>2003-11-27T11:44:15Z</dc:date>
    </item>
  </channel>
</rss>

