information on teen dating violence - Wtmp not updating

But, after doing this, I have the unwanted side effect that users loging in via lightdm doesn't appears at all in this list.

Just remove the files for the unwanted users from that dir and the greeter no longer shows them.

EDIT: And this is of course after the already suggested stuff has been done (clearing /var/log/wtmp and /var/log/btmp).

You can enable bad login logging by simply creating the file.

Doing a chmod o-r /var/log/btmp improves security.[[email protected] ~]# touch /var/log/btmp [[email protected] ~]# ll /var/log/btmp -rw-r--r-- 1 root root 0 Jul 30 /var/log/btmp [[email protected] ~]# chmod o-r /var/log/btmp [[email protected] ~]# lastb btmp begins Mon Jul 30 2007 [[email protected] ~]#[[email protected] ~]# lastb Halvar Fl tty3 Mon Jul 30 - () Maria tty1 Mon Jul 30 - () Roberto tty1 Mon Jul 30 - () btmp begins Mon Jul 30 2007 [[email protected] ~]#[[email protected] ~]# cat /var/log/secure Jul 30 sshd[4387]: Accepted publickey for paul from ::ffff:19\ 2.168.1.52 port 33188 ssh2 Jul 30 sshd[4388]: Accepted publickey for paul from ::ffff:19\ 2.168.1.52 port 33188 ssh2 Jul 30 sshd[4655]: Failed password for Hermione from ::ffff:1\ 92.168.1.52 port 38752 ssh2 Jul 30 sshd[4656]: Failed password for Hermione from ::ffff:1\ 92.168.1.52 port 38752 ssh2 Jul 30 sshd[4655]: Failed password for Hermione from ::ffff:1\ 92.168.1.52 port 38752 ssh2 Jul 30 sshd[4656]: Failed password for Hermione from ::ffff:1\ 92.168.1.52 port 38752 ssh2 Jul 30 sshd[4655]: Failed password for Hermione from ::ffff:1\ 92.168.1.52 port 38752 ssh2 Jul 30 sshd[4656]: Failed password for Hermione from ::ffff:1\ 92.168.1.52 port 38752 ssh2 Jul 30 sshd[5018]: Invalid user roberto from ::ffff:192.168.1\ .52 Jul 30 sshd[5019]: input_userauth_request: invalid user rober\ to Jul 30 sshd[5019]: Failed none for invalid user roberto from \ ::ffff:192.168.1.52 port 41064 ssh2 Jul 30 sshd[5019]: Failed publickey for invalid user roberto \ from ::ffff:192.168.1.52 port 41064 ssh2 Jul 30 sshd[5018]: Failed password for invalid user roberto f\ rom ::ffff:192.168.1.52 port 41064 ssh2 Jul 30 sshd[5019]: Failed password for invalid user roberto f\ rom ::ffff:192.168.1.52 port 41064 ssh2 [[email protected] ~]# from many applications (and appliances), and can append to log files, print, display messages on terminals and forward logs to other syslogd daemons on other machines.

Configure syslog to put local4.error and above messages in /var/log/l4and local4only in /var/log/l4

I use SSH on a regular basis to log to remote machines and was wondering: is there some sort of 'stealth' mode one can use SSH as?The need came as I prepared computers for others, and didn't want my name to pollute the list on every computer out there.I was also searching for this and finally figured it out how to do this in Ubuntu 16.04.ELs Wed Feb 14 () nicolas pts/5 pc-dss.telematic Wed Feb 14 - () stefaan pts/3 pc-sde.telematic Wed Feb 14 - () nicolas pts/3 pc-nae.telematic Wed Feb 14 - () nicolas pts/3 pc-nae.telematic Wed Feb 14 - () dirk pts/5 pc-dss.telematic Wed Feb 14 - () nicolas pts/3 pc-nae.telematic Wed Feb 14 - () dimitri pts/5 rhel4 Wed Feb 14 - () stefaan pts/4 pc-sde.telematic Wed Feb 14 - down () [[email protected] ~]# [[email protected] ~]# lastlog | tail tim pts/5 10.170.1.122 Tue Feb 13 0100 2007 rm pts/6 rhel4 Tue Feb 13 0100 2007 henk **Never logged in** stefaan pts/3 pc-sde.telematic Wed Feb 14 0100 2007 dirk pts/5 pc-dss.telematic Wed Feb 14 0100 2007 arsene **Never logged in** nicolas pts/5 pc-dss.telematic Wed Feb 14 0100 2007 dimitri pts/5 rhel4 Wed Feb 14 0100 2007 bashuserrm pts/7 rhel4 Tue Feb 13 0100 2007 kornuserrm pts/5 rhel4 Tue Feb 13 0100 2007 [[email protected] ~]# file.This file is updated by the login program when entering the wrong password, so it contains failed login attempts.Many computers will not have this file, resulting in no logging of failed login attempts.

Comments are closed.