Solved

How to AGAIN ????

Posted on 1998-12-07
8
248 Views
Last Modified: 2010-04-21
How do I act like my username / myself is not exist in the unix system? Because as I ask the question before, some user can make other people can't finger them, now I wanna know how to make myself act like not exist in the entire system.
i.e. no body can "finger" me, "last" me, etc.......
Because I saw one of the user can do this.
0
Comment
Question by:clo1
  • 4
  • 3
8 Comments
 
LVL 2

Author Comment

by:clo1
ID: 2008236
Edited text of question
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008237
Probably you can, but ist a huge work to do.
Just some example how someone else can see if you are on the system:

  1) ps -euf
  2) w
  3) who
  4) rwho
  5) last (or lastcom, lastcmd, whatever your OS supports)
  6) cat /etc/passwd; find / -uid xxx -ls|grep "`date +%b`"
  and much more ..

You either have to patch all these commands, or restrict other users to use them.
0
 
LVL 2

Author Comment

by:clo1
ID: 2008238
but how do i do so, i want to know how to "invisible" in the entire system.
0
Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008239
chmod 550 /bin/ps
chmod 550 /bin/ls
chmod 550 /bin/find



But dis you realy want that other users canot use these programs?
0
 
LVL 2

Author Comment

by:clo1
ID: 2008240
my system do not allow me to do so !
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 2008241
so you're not root ;-)
If you have no root access to the system, there is no way to hide yourself.
THERE IS NO WAY AROUND THIS.
0
 
LVL 3

Expert Comment

by:braveheart
ID: 2008242
This question looks suspiciously like "When I have hacked into someone else's computer, how do I mke myself invisible".
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008243
braveheart, lets hack them into UNIX, and they're always seen ;-)
Probably it's going worse if they get root access.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Vmware Vswitch  VS  Redhat  Bridge 1 115
Where to get php 5.6 for AIX 7.1? 5 120
aix tls version 6 434
Best way to split and output to csv in bash 2 67
When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question