<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: user login record in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625536#M39747</link>
    <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I'm afraid it will be a difficult if not imposible task to get the information you want.  You can use the "last" command to see when people logged in.  You can use "who -a /var/adm/wtmp" and get more information.  /var/adm/sulog lists people who changed accounts with "su".  /var/adm/syslog/syslog.log may have some information depending on the logging options you have.  Most of this is not going to tell you who did what though.  Unless you had a tool in place before-hand, you're going to be very limited in what you can find.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
    <pubDate>Wed, 05 Dec 2001 02:44:37 GMT</pubDate>
    <dc:creator>Darrell Allen</dc:creator>
    <dc:date>2001-12-05T02:44:37Z</dc:date>
    <item>
      <title>user login record</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625533#M39744</link>
      <description>someone has make some modification on the system, and I'm trying to spot who make the change, from where(IP address). Which log or command can show me this information?</description>
      <pubDate>Wed, 05 Dec 2001 01:14:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625533#M39744</guid>
      <dc:creator>Yu Zhen_1</dc:creator>
      <dc:date>2001-12-05T01:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: user login record</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625534#M39745</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;For usage accounting, you can use runacct (run accounting mode) and acctcom (list accounting records). man runacct and man acctcom for more information. This comes with HP-UX PRM application.&lt;BR /&gt;&lt;BR /&gt;To track what the opened files and opened processes from a specific IP address, you can only perform it in real-time mode using lsof. lsof is a third-party utility that does not come with HP-UX.&lt;BR /&gt;&lt;BR /&gt;If you just want to monitor the network services used from a particular IP. In historical mode, enable inetd -l for inetd logging. In real-time mode, use netstat -f inet or lsof.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong&lt;BR /&gt;Brainbench MVP for Unix Admin&lt;BR /&gt;&lt;A href="http://www.brainbench.com" target="_blank"&gt;http://www.brainbench.com&lt;/A&gt;</description>
      <pubDate>Wed, 05 Dec 2001 01:24:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625534#M39745</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2001-12-05T01:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: user login record</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625535#M39746</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Unless you already have some sort of&lt;BR /&gt;system accounting or auditing, it would&lt;BR /&gt;be extremely difficult.&lt;BR /&gt;&lt;BR /&gt;To prevent this occurance first thing to &lt;BR /&gt;do would be search the system for any &lt;BR /&gt;files that are:&lt;BR /&gt;&lt;BR /&gt;-rw-rw-rw-   1 root  root 1116 Dec  2 05:33 file&lt;BR /&gt;or &lt;BR /&gt;-rwxrwxrwx   1 root  root 1116 Dec  2 05:33 file&lt;BR /&gt;&lt;BR /&gt;and change them to more appropriate privleges.&lt;BR /&gt;&lt;BR /&gt;Change the root password.&lt;BR /&gt;Search through the /var/adm/sulog for the persons responsible that should not have access.&lt;BR /&gt;Make sure that you /var/adm/inetd.sec file&lt;BR /&gt;is secure. &lt;BR /&gt;Implement something like 'sudo' to assist in&lt;BR /&gt;your security.&lt;BR /&gt;Add the word 'console' to /etc/securetty &lt;BR /&gt;(without the quotes) so that users cannot login&lt;BR /&gt;directly as root.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2001 02:02:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625535#M39746</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-12-05T02:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: user login record</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625536#M39747</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I'm afraid it will be a difficult if not imposible task to get the information you want.  You can use the "last" command to see when people logged in.  You can use "who -a /var/adm/wtmp" and get more information.  /var/adm/sulog lists people who changed accounts with "su".  /var/adm/syslog/syslog.log may have some information depending on the logging options you have.  Most of this is not going to tell you who did what though.  Unless you had a tool in place before-hand, you're going to be very limited in what you can find.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
      <pubDate>Wed, 05 Dec 2001 02:44:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625536#M39747</guid>
      <dc:creator>Darrell Allen</dc:creator>
      <dc:date>2001-12-05T02:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: user login record</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625537#M39748</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you track down the person through &lt;BR /&gt;either /var/adm/syslog/syslog.log&lt;BR /&gt;or /var/adm/sulog you could look&lt;BR /&gt;into their home directory and view&lt;BR /&gt;their .sh_history file&lt;BR /&gt;&lt;BR /&gt;If they are smart enough they will have&lt;BR /&gt;already covered their tracks, but they&lt;BR /&gt;may not have. &lt;BR /&gt;&lt;BR /&gt;-Michael&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2001 02:50:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625537#M39748</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-12-05T02:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: user login record</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625538#M39749</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Enabling auditing would help in most  way. &lt;BR /&gt;If you have doubt on somebody who could possibly making changes than by checking .history file in that perticular users home directory. &lt;BR /&gt;Who -R would show you the person loging in from where, when he had logged in.&lt;BR /&gt;&lt;BR /&gt;-USA..&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Dec 2001 02:53:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-login-record/m-p/2625538#M39749</guid>
      <dc:creator>Uday_S_Ankolekar</dc:creator>
      <dc:date>2001-12-05T02:53:53Z</dc:date>
    </item>
  </channel>
</rss>

