Author: Ruwantha Nissanka

How to monitor user activity in Linux with Acct

Acct is an open source application that we can use to monitor user activity in Linux. This tool comes with the functionality of running in the background and tracking user activity. It also reports what are the system resources are being consumed by the users. In this guide, we will see how to install and use this tool. Step 01 : Installation You can install it with the following command #sudo apt install acct Step 02 : Starting the service to monitor user activity After installation, you can start the service to run in the background by running the following command #/etc/init.d/acct start Step 03 : check the status You can check the status of the service and verify the monitoring is active in the background #/etc/init.d/acct status Step 04 : Display Individual User Time To get the total login statistics time of a particular user in hours, use the following command #ac <username> Step 04 : Display the total login time of each user The following command will display the total login time of each user in hours. #ac -p Step 05 : Display Day-Wise Login Time of User If you need to check the day-wise total login time of a particular user in hours, run the following command. #ac -d <username> Step 06 : Display Statistics of Users Day-wise This command will display the total login time...

Read More

Debsecan : You will not miss another security update

Do you ever wonder how to keep up with the new security updates releasing daily? Debsecan is a great tool that you can use to simplify this task. This utility will help you to evaluate your current security status without searching for the new security updates manually. And also it comes with the feature to report the missing security updates. Most importantly, it will let you know if there’s any known vulnerabilities exists in the already installed programs. Step 01 – Installation #sudo apt install debsecan Step 02 – List identified vulnerabilities with debsecan In the following examples, we assume that the host under examination runs Debian sid. Therefore, the –suite sid option is specified in all cases. Since version 0.3, the –suite is no longer mandatory, but additional information is available if you specify the correct suite. The first command gives a brief overview of all known vulnerabilities which potentially affect the system: #debsecan --suite sid On ubuntu, #debsecan --source This Improves Ubuntu security feed compatibility allowing it to be consumed by debsecan. Step 03 – get detailed output with debsecan We can get more details if we choose a different output format: #debsecan --suite-sid --format-details Step 04 – List only missing security updates Using –only-fixed, the output can be restricted to missing security updates: #debsecan --suite sid --only-fixed Step 05 – Install the identified security updates with apt-get The packages output format is suitable for...

Read More

SSH Command explained in 5 simple steps

Secure Shell (SSH) is a network protocol that is used to create a secure encrypted connection between 2 computer systems. Once the connection has been established, the user can do the following tasks on the remote system Execute commands on the server X11 tunneling Port forwarding, and more There are mainly 2 parties involved when creating the connection: SSH client SSH server The SSH client creates a secure connection to the SSH server on a remote machine. So in this scenario, the user can use a SSH client in their computer and connect to a remote SSH server. There are a number of SSH clients available, both free and commercial. OpenSSH is the most widely used client in nowadays and it is available on all major platforms, including Linux, OpenBSD, Windows, and macOS. In this Guide, We will discuss how to use the OpenSSH command-line client (SSH) to login to a remote machine and run commands or perform other operations. Step 01 : Installation You have to install the openssh-client in order to connect to the remote host #sudo apt install openssh-client Step 02 : Connect to a remote machine using ssh with the current system login name When the username is not given, the ssh command uses the current system login name #ssh <hostname/ip address> You will be prompted with a message like below when you connect to a remote machine...

Read More

Over 16,000 readers, Get fresh content from “The Linux juggernaut”

Email Subscribe


My photo
My name is Surendra Kumar Anne. I hail from Vijayawada which is cultural capital of south Indian state of Andhra Pradesh. I am a Linux evangelist who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likes photography. At present I work at Bank of America as Sr. Analyst Systems and Administration. You can contact me at surendra (@) linuxnix dot com.