User commands and logs

Keeping Log


Many logging and user-related commands can help you check on your system and keep track of security matters. We guide you through several helpful tools.

You can tell that Unix and Linux were designed for multiple logins by all the logs and commands that provide information about users. These tools often detect the first signs of an attempt to break into your system. In an institutional environment, they can be used to check not only what resources are being used but also whether users are doing what they are supposed to be doing.

If you have done any systems administration at all, you have probably used the adduser command. The adduser command (Figure 1) provides a simple wizard to help you create a new account. By default, much of the work is done for you, such as automatically creating a user ID (UID). However, you can choose to specify many details for yourself with options like --gid ID and --shell SHELL.

Figure 1: The command-line wizard with which most user accounts are added.


Use Express-Checkout link below to read the full article (PDF).

Read full article as PDF:

Price $2.95

Related content

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95


njobs Europe
Njobs Netherlands Njobs Deutschland Njobs United Kingdom Njobs Italia Njobs France Njobs Espana Njobs Poland
Njobs Austria Njobs Denmark Njobs Belgium Njobs Czech Republic Njobs Mexico Njobs India Njobs Colombia