User commands and logs
As you might guess from the name, the
groups command extracts selected information from the
/etc/group file and displays it (Figure 9). With no options,
groups lists information for the current user, but a valid username can be used as an option instead.
For some reason, the
finger command is not installed by default on the desktops of many distributions. However, if you are administering a multiuser system, it is well worth installing.
Without the use of any options, or with the
-s option (Figure 10),
finger followed by an account name lists the login name, the name, the interface, how long the user has been idle, when they logged in, their office, and their office phone number. If, like many home users, you leave the name, office, and office number blank when you create users, these columns will, of course, be empty.
-l option, you get the same information reformatted, plus the user's home directory and login shell, as well as the last time they received internal mail. For administration work, this option is probably the most useful.
One of the most useful commands for gathering information about users,
w, is also one of the simplest. It shows what processes a user is running at the time the command is run.
w command plus a username (or omitting a username and defaulting to the current account) produces a table of information for the user (Figure 11). From left to right, the information is the user account, its terminal, its remote host (0 if none exists), the login time, the length of idle time, the JCPU or time used by all processes attached to the terminal, the PCPU or time used by the current process, and the name of the current process.
If you choose, you can run a shorter summary by using the
-l option. The information displayed using the
-l option omits the login time, the JCPU, and PCPU.
Buy this article as PDF
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.