History for http://www.cyberciti.biz/tips/howto-log-user-activity-using-process-accounting.html

Sort by: Date / Title /

  1. Intrusions can take place from both authorized (insiders) and unauthorized (outsiders) users. My personal experience shows that unhappy user can damage the system, especially when they have a shell access. Some users are little smart and removes history file (such as ~/.bash_history) but you can monitor all user executed commands.
    20-08-2013 to , by tostado
  2. Benutzeraccounting/-logging unter Unix mit den psacct Tools
    15-11-2006 to , , , , by reefu
  3. bigbrother für shared systems
    14-11-2006 to , , , by totpunk

First / Previous / Next / Last / Page 1 of 1