re: command history

I didn't see the original post, so I'll just reply here.  Pablo, there are a
few ways to do this. The first, and probably the best, is to enable
auditing. Just look this up in your system documentation. The second method,
and one that will work nicely where the system doesn't provide auditing
capability, is to redirect a shell's history to an append only file. This
can usually be configured using a low-level file system tool. Naturally,
this second method doesn't work on all systems, but it's still nifty to know
about.

Regards, Dustin

> -----Original Message-----
> From: raphael jimenez [mailto:[EMAIL PROTECTED]]
> Sent: Friday, October 19, 2001 4:22 AM
> To: Pablo Gietz
> Cc: [EMAIL PROTECTED]
> Subject: Re: how to
>
>
> hi,
>
> I'm not a guru by far :-)
>
> but why not using a script command in each user's .profile ?
> with using the secure shell
> /usr/lib/rsh, (man -s 1m rsh under solaris).
>
>
> this way, if you control the .profile (say only root has write access)
> you are able to control which command may be used (through control of
> the variable PATH).
>
> then it's up to you to use say a script command with suid and store
> these files in a separated area .
>
> hope it helps
>
> regards,
>
> raphael
>
> Pablo Gietz wrote:
>
> > Hi gurus
> >
> > Solaris 7.x
> >
> > There are any way to log the commands inputs from the Unix shell.
> > We need to log time, date, tty , user_id, command executed for every
> > users that login to the system.
> >
> > Thanks a lot.
> >
> >
>
>
>

Reply via email to