Solved

terminate

Posted on 2001-07-19
5
314 Views
Last Modified: 2013-12-23
when logged in as root
is there a command to end a users session?
eg a user pulled the plug on their pizza and as far is w is concerne they are still logged on, can i in effect terminate that session
0
Comment
Question by:KLilburn2108
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 25 total points
ID: 6297921
with the
  w
command you get a list of all active (login) session, for you the USER and TTY column is of interest.
Then is ps (ax  or  -ef, depending on your OS) and grep for that user using this tty. Finally use
  kill -9 <pid of shell of idetified user>
0
 
LVL 4

Assisted Solution

by:Otetelisanu
Otetelisanu earned 25 total points
ID: 6302511
Or make
1.ps -ef|grep John
Example:
John 10900 10899  0 10:27:07 pts/15   0:00 rlogin pluto
2. fuser -k /dev/pts/15
and kill all process from John
on the terminal 15
0
 

Expert Comment

by:CleanupPing
ID: 9157239
KLilburn2108:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question