Fedora Security :: Delete Input History?
Oct 18, 2010What command is used to delete input command history in terminal ?I am afraid my friend will trace what been inpu
View 10 RepliesWhat command is used to delete input command history in terminal ?I am afraid my friend will trace what been inpu
View 10 RepliesI am using skype in fedora 9. I am searching how can I delete skype call/chat history. I have searched some .dbb files in /home/<username>/.Skype/<skyID> directory like chatmsg2048.dbb. Can I safely remove these files in order to delete my chat history. Also, I cannot view these .dbb files in gedit. If I can read these files, I can better decide which history I need to delete.
View 3 Replies View RelatedI wanna trace user's command input history. but I dont plan to use "history", "lastcomm" becauze there is not detail of the user command history. if there is some software use to log user command to one file or database, it's suit for me.
View 1 Replies View RelatedI'm using RHEL 5.0 and i want to delete history for n users at a time.i can use history -c from each user login and delete but i want another way.or i want to create a shell script by using which i can do d task at a glance for all users.
View 1 Replies View RelatedI want Firefox to delete history after several days. Can I configure it this way?"Remember my browser history for at least..." is not the option which does it, right?
View 11 Replies View RelatedI thought I would give Gwibber a a try, so I set up my Twitter account with it. Seemed to work just fine. However, when I deleted the Twitter account from Gwibber, the messages I previously downloaded are still in the main window. I've checked for ".gwibber" in the home folder, but there's not one. So, I did a search on the machine for all Gwibber folders, and none had any message history in it.
View 2 Replies View RelatedIs there a way to get the bash history to delete older entries that are identical to the new one?Say the bash history would look like this normally:
Code:
cd ~
ls -l
[code]...
i want to delete some say 10 previous commands in bash shell!
View 3 Replies View RelatedI'm using Ubuntu 10.10 netbook, and i want to delete my chat history on pidgin and skype beta 2.1.0.81 but i couldn't find how to delete it.
View 9 Replies View RelatedI have a system in which I do not have root access to. On that system, I have my own directory which I share with other users. I am trying to clean it up when I noticed that there was a subdirectory created by another users in my group that I cannot delete. It has all the permissions set besides global write. How can I delete this folder without root permission? I can't even chmod or chown it.
View 3 Replies View Relatedway to automate adding and removing users from 10 different Fedora 7 servers. We use them as print servers and our users have a user name and password to authenticate with when printing. We also use Samba to talk to a W2k3 server that tracks and charges the users for what they print. The set up was done by a vendor and after 6 months of being in production the scripts they created has flaws.
I need a way for a script to run as often as possible that will remove, change, or delete user accounts from the servers and from Samba. how to most effectively achieve this?
It would be ideal to have a file that gets written to when a change needs to be made then a script to make these changes?
I think someone hacked my server and I'm wondering if it's possible to view the possible the past user logons?
View 6 Replies View RelatedI am running Ubuntu, and I was wondering if there are any settings that I can change in order to remove to make it so that users of the computer cannot delete the history in Firefox without a password. I am even willing to switch to another Internet browser if necessary.
View 1 Replies View RelatedI ve a script to delete a folder is given below:
1. I need a script to clear the cacheroot in my box.
2. What user mention to delete the folder that should ve to delete.
What are all the ways you could think of that someone could view your browsing history, upstream from your machine? They don't have physical access, there's nothing on the computer itself and the person trying to hack has skill so I'm thinking like monitoring a proxy somehow, using the ip address somehow, compromising the modem in some way, possibly having access to google account etc. I am new to ubuntu and have really dug it so far but I want to figure how this is/was being done
View 9 Replies View RelatedWhat's the command to delete bash command history?
View 4 Replies View RelatedMay i ask if how or should i concern about my history records my rdesktop full cmd. I dont want to disable my history in the cmd and want to use it.
Im using rdesktop cmd since it more easy and direct to connect to a terminal RDP. I noticed the history records all my full command rdesktop which state the domain, user ,password. in txt mode..May i ask if this has any problem should i concern with..
IMDB gives me a "recently viewed" list of pages I viewed recently (and a few of them were months ago, since I don't go there too often) at the bottom of every page I view. My cookies are enabled for session-only, have adblock plus, my ip changes every day, how are they doing that? How can I prevent it? What other websites are using the same trick? At this page [URL] there's a link there that says "Clear entire history", but I want to disable them from being able to track me like that, if they can track me, so can others.
View 3 Replies View RelatedI am using squid proxy server for sharing Internet in my internal network. I would like to know that how can I check the browsing history by individual users web surfing history by their IP addresses?
View 1 Replies View Relatedi am investigating on solutions to trace a file deletion on a computer( Linux O/S).i also need to determine weither after a file deletion or download on a computer, the computer clock had not been modified. In case a file has been downloaded on a computer and then transferred to a removable device, i need to find out the file activity. i mean i should be able to tell that the file was downloaded and transferred to a device with possible specifications.
View 2 Replies View RelatedI just made a script to read out /dev/input/event3 into a file (My keyboard is identified here [ Machine is a laptop which runs on slax-atma distro ]). Then used a hexdump to convert the binary into hex. After that used a gwak script to print out the keys corresponding to each keyboard input. So now when I put this in my rc.local , It is taking down all the keys I press. Including login passwords (In short, each and every keys I press).Isn't this a big security risk, because intruder who has a physical access to my machine or has root password can put this file in rc.local and run a script to mail him all the details like my passwords, account and PIN numbers.
View 14 Replies View RelatedI have server ubuntu natty 11.04-64 bit, Yesterday, I Think I had been hacked by someone..
How to create report to see log for brute force attack?
I have some port opened 80, 53(bind9), SSH(22), Port Squid & some port java
I am Also worried that Guy is create other username for login
How to check that?
Is it possible to recovery HISTORY at ubuntu..?
I recently started shell programming and my task now is to do a menu display.Currently i am stuck whereby user will input both title and author and it will delete it.
Do i have to use sed command?
Quote:
-A RH-Firewall-1-INPUT -s 10.12.0.0/16 -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
Ex- 10.12.0.0/16, 172.150.0.0/16, 192.168.20.0/24
How can we add multiple sources network address in the above INPUT chain?
Long time reader, first time poster. I've got, what has become to me, a brain bender. It seems ACL's are the best way to go, but I am not 100% sure. Each user should be able to create files and modify each others'files, but should not be able to delete any one elses files in a directory.chmod -1777?setfacl?
View 2 Replies View RelatedI read some articles about viruses in Linux and about some antiviruses which work in Linux and delete Windows viruses but I still don't understand: is there any antivirus which specializes in Linux viruses? Even though there are very little of Linux viruses, I know.
View 11 Replies View RelatedWould it be safe to say that if I build a restricted user: "Desktop" or "unprivileged" user I will be ok? From what I understand - most scripts or applications cannot install without the 'sudo' prompt and user input.
View 8 Replies View RelatedI have a Ubuntu file server with a mix of 30+ users ( mix of windows and linux ).All are members of the same group. All need read write create access. I want to prevent deletion of certain key folders. How can I achieve this ? sudo chmod -R nnnn ??
View 8 Replies View RelatedI have read in some book that syslogd keeps lots of logs that with the time consume a considerably part of your hard drive. I know this is very nice feature and all that, but sometimes privacy in this competitive world is a matter fact. Here goes the questions: Is it possible to 'auto delete' the syslogd files automatically? May the destruction of the logs make some hangs on my system? May some program need the daemon to function properly?
View 1 Replies View RelatedOn my RHEL5 system one of my key file in one specific directory gets deleted when I start my application suite (having multiple processes). Is there some way to narrow down which specific process is deleting this file?
View 8 Replies View Related