Solved

users

Posted on 1998-02-24
8
251 Views
Last Modified: 2010-04-21
UNIXer,

How can I know (programming is also okay) all the usernames that can login to the UNIX server ??????

Andrew
0
Comment
Question by:andrewyu
  • 2
  • 2
  • 2
  • +2
8 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 2008910
cat /etc/passwd
0
 
LVL 4

Expert Comment

by:jos010697
ID: 2008911
better make that 'ypcat passwd' if we're talking 'servers'
(and/or 'clients') here ...

kind regards,

Jos aka jos@and.nl
0
 

Author Comment

by:andrewyu
ID: 2008912
But, I am not the admin !
0
 
LVL 3

Expert Comment

by:rickyr
ID: 2008913
Hi...
By default the world has read acces to the /etc/passwd file,
anyone can read it, yes it may seem like a security bug, but most OS's use a shadow file to store the password encryption, this should not be readable by anyone.
ozo, brief and to the point as ever, has got it.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Accepted Solution

by:
redsun earned 10 total points
ID: 2008914
the most way is :

  finger @hostname,now you maybe get some  info,they are loggin .
0
 

Author Comment

by:andrewyu
ID: 2008915
I want to get all the username on that can login to the server !!!!!!
0
 

Expert Comment

by:redsun
ID: 2008916
Oh,if you can login it, cat /etc/passwd.
if not ,only finger it.anyelse is impossblie.
0
 
LVL 3

Expert Comment

by:rickyr
ID: 2008917
Hi...
That's what ozo said.
Do you have a user account on the server?....
prompt> rsh server_name
If your login is not trusted on the server, you'll be asked for your password, then...
prompt> more /etc/passwd
I'm with ozo on this one.
regards
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Attention: This article will no longer be maintained. If you have any questions, please feel free to mail me. jgh@FreeBSD.org Please see http://www.freebsd.org/doc/en_US.ISO8859-1/articles/freebsd-update-server/ for the updated article. It is avail…
In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now