Solved

How to AGAIN ????

Posted on 1998-12-07
8
238 Views
Last Modified: 2010-04-21
How do I act like my username / myself is not exist in the unix system? Because as I ask the question before, some user can make other people can't finger them, now I wanna know how to make myself act like not exist in the entire system.
i.e. no body can "finger" me, "last" me, etc.......
Because I saw one of the user can do this.
0
Comment
Question by:clo1
  • 4
  • 3
8 Comments
 
LVL 2

Author Comment

by:clo1
ID: 2008236
Edited text of question
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008237
Probably you can, but ist a huge work to do.
Just some example how someone else can see if you are on the system:

  1) ps -euf
  2) w
  3) who
  4) rwho
  5) last (or lastcom, lastcmd, whatever your OS supports)
  6) cat /etc/passwd; find / -uid xxx -ls|grep "`date +%b`"
  and much more ..

You either have to patch all these commands, or restrict other users to use them.
0
 
LVL 2

Author Comment

by:clo1
ID: 2008238
but how do i do so, i want to know how to "invisible" in the entire system.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008239
chmod 550 /bin/ps
chmod 550 /bin/ls
chmod 550 /bin/find



But dis you realy want that other users canot use these programs?
0
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 2

Author Comment

by:clo1
ID: 2008240
my system do not allow me to do so !
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 2008241
so you're not root ;-)
If you have no root access to the system, there is no way to hide yourself.
THERE IS NO WAY AROUND THIS.
0
 
LVL 3

Expert Comment

by:braveheart
ID: 2008242
This question looks suspiciously like "When I have hacked into someone else's computer, how do I mke myself invisible".
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008243
braveheart, lets hack them into UNIX, and they're always seen ;-)
Probably it's going worse if they get root access.
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now