General :: Denying Login Based On Time

May 1, 2010

i want to deny certain users based on time to login to my machine i am using CentOs 5.0 any sugestions?

View 2 Replies


ADVERTISEMENT

General :: Calculation Of Working Time Based On System Uptime

Jul 28, 2010

I know several tools that allow tracking time spend on different tasks / projects.Is there any existing tool for very very simplified work-time-tracking.I am an employee, come to the office, switch on my laptop directly. I have mostly around 1 hr lunchtime, but sometimes less, sometimes more.At around 18:00 I want to type one command in the console (or simple GUI would also be okay of course) that tells me:"1 hour overworked. Go home now! (came at 8:00, 1 hour standard lunch-break)."

View 1 Replies View Related

General :: Script To Execute A Command Based On The Last Modified Time Of A Folder

Oct 19, 2010

I need a script that executes a command based on a folder's last modified time.

if "/var/data" was modified in less than an hour then "/usr/local/etc/searchd stop" should be run

can we use "find -mmin +60 -type d" in conjunction with second command

View 1 Replies View Related

General :: Firestarter Denying Connections On Ports 80 & 443 Despite Settings

Apr 19, 2011

My firestarter is denying connections on ports 80 and 443, despite the fact that I have set rules to allow both the services, and indeed any connection from my gateway (the source of the connections).

Can someone please advise why this might be?I can surf the 'net fine, unfortunately I cannot load facebook, gmail, or another couple of sites that require logins, and I assume this is due to HTTPS not communicating properly.(On the off chance anyone can answer these real quick, I'm also trying to solve my resolution resetting every time I restart, and one of the icons in my KDE panel turning into a widget from an icon every time I restart. Still working on these, but just if anyone knows already).

View 1 Replies View Related

General :: SSH Login Time Was Really Slow?

May 30, 2009

I'm running CentOS with cPanel, configured to update every night.This morning my SSH login time was really slow:Code:login as: chrillechrille@example.com's password:After this step it takes about 60 seconds before I get logged in:Last login: Sat May 30 15:27:54 2009 from addr-no109.tbcn.abc.comchrille@homer [~]#I have also noticed that my PHP SOAP (network communication) calls has been really slow, and I sometimes get e-mails saying that exim is out of tcp connections.Seems like something has updated wrong this night, but I can't figure out what. I have looked in /var/log/messages and /var/log/secure, but they give me no clue.

View 6 Replies View Related

General :: Ulimit To Set The Time Of Login?

Mar 11, 2010

Is it possible to set a user to login only during 3rd week of every month using ulimit ?

I searched in man page of ulimit. Turned out with no luck.

If its not possible by ulimit, is there any other way to accomplish this ?

View 3 Replies View Related

General :: Automatically Open Terminal At Login Time?

Jun 7, 2011

I am using red hat .I want that when ever the user login in GUI interface the terminal windows automatically open and then the user want to logout it 1st close the terminal and then login. There is a file in #ls -a i.e .bashrc and .bash_logout

View 13 Replies View Related

General :: How To Find Vsftpd Users Last Login Time

Mar 10, 2011

extracting a list of all vsftpd users with last login time.

ie,

USER NAME : LAST LOGIN TIME

View 1 Replies View Related

Debian :: Bash Script Based On Time Of Day

Mar 25, 2016

I'm trying to get a bash script to do different things based on the time of day, but at least once a day the test fails:

Code: Select allNOW=$(date +%k%M)
if [[ "$NOW" -ge 1000 ]] && [[ "$NOW" -le 2200 ]];then
        alarm lon
else
        alarm loff
fi

This is the error, and line 59 is the second quoted above:

Code: Select all/home/electrolux/bin/ts.sh: line 59: [[: 059: value too great for base (error token is "059")

The script is run every minute, and this error only occurs at 12:59AM, or 00:59.

I presume the problem is either $NOW is being set to 059, or the testing is seeing 0059 as 059. I think the latter, because for the rest of midnight 'til 00:58 the script works. And with some Googling it seems that the leading 0 is making test treat the number as octal... is there a way to tell it it is decimal?

Perhaps this is just some poor time-testing code? Looking at it I don't think it will cope with set time period that crosses midnight..... there's probably just a command to do what I want, isn't there? I know I could have two different scripts cron'd for the different time periods, but it would be much more preferable to be just the one.

View 4 Replies View Related

General :: Debian Based - Arch Based - What Is The Practical Difference?

Jun 7, 2010

I notice that on DistroWatch, the descriptions include "debian based", "arch based", etc. For the newbie, is there any practical difference between the different bases, or is it a Coke vs Pepsi type question?

Is a distro based on Debian say, easier for a newbie to learn or work with than say one that is FreeBSD based?

View 9 Replies View Related

General :: Black Screen Getting After Some Time Login When Connecting Through Vnc To Rhel 5.3?

Mar 25, 2010

as after connecting thru vnc (any tightvnc or real vnc),after some time of the connecting the Linux server RHEL 5.3,screen goes black screen with X mouse movement,getting after some time login all the things are visible even we can open the terminal & any application thru taskbar option,but after some time the screen goes black with big X. eventhough I tried to disable the screen saver option then also is happening.

View 1 Replies View Related

Ubuntu :: Conky For Network Traffic Based On Time

Dec 11, 2010

I have installed conky from soft manager after knowing its power today. I'm using 10.10. I want to design a conky script which monitor the network traffic ie total upload + download on monthly basis as I'm on limited internet plan which is too common here. I have free usage from 2am to 8am in the morning and want to exclude this traffic. So I'm in search of a custom script which can accomplish this.

View 1 Replies View Related

Software :: Way To Sort A Files Based On Creation Time

Jul 7, 2010

Code...

But I want to get the files in order which they created like file, file1 and file2

Any way to obtain this?

View 6 Replies View Related

General :: How To Get Time From Power On System To Show User Login View

May 16, 2011

I want to get the time from power on system to showing user login view in Linux, how to do? Can it work only with shell?

View 2 Replies View Related

Software :: Best Console Based Calendar / Time Manager (or Backend)?

Jan 20, 2010

Looking for console based calendar / time manager (or backend)? Well is there a good one to be known? Maybe else than 'when'? Joe Barr has written a nice intro to the program in his column at linux. [URL]. Is there some backend and frontend that could be used? Or alternatively, could it be possible to have them on an Kerberos/Ldap system or exchange server? What are the best and multiplatform single cal database possibility?

View 1 Replies View Related

Security :: IPTABLES - Restrict Internet Access Based On Time Of Day And MAC Address

Feb 6, 2010

I am trying to configure my Linux router to restrict Internet access for one computer on my LAN. It needs to be restrictive based on the time of day and the days of the week. I am using the MAC address of the computer to single out the one computer that needs to be blocked. However, this is my first attempt at making any rules with iptables, and I am not sure if I am doing this right. If some one can take a look at this I would greatly appreciate it. This is what I have done so far.

Here is my thinking. Create a new target. Check the MAC address, if it is NOT the offending computer return to the default chain. If it is the offending computer check that we are between the allowed hours and dates and ACCEPT. If we are not within the time/date range then drop the packet.

Code:

Here I am trying to route all packets regardless of the computer on the LAN into the blocked_access chain for checking.

Code:

Is it a good idea to route all traffic through the blocked_access chain? I do run other servers that are accessible from the Internet, so I am not sure how this setup will affect that. I also use shorewall on the router to setup iptables for me. How would I integrate this with shorewall?

I am using squid to block access when he is using the web browser. However, he is still able to play games(World of Warcraft) and the like.

I am using Debian sid, iptable(1.4.6), shorewall(4.4.6), kernel 2.6.32-trunk-686.

View 7 Replies View Related

CentOS 5 Networking :: TIme Based Ethernet Interface Disable And Enable?

Mar 14, 2011

Im new to this Cent OS as well as Unix based Operating Systems. Please help me with the below requirement.My Company is a Serach based data collector from different websites like Google, Yahoo & many more..Collecting the data from the search engines is a issue for right now.. As many search engines are blocking us to search and retrive the date after some time.. Taking Google as example : Google Blocks my IP after every 30 mins of retriving.. Application is a Windows based & using Windows 2003 as the Server.. Would like to give a Dynamic IP to the Windows Server via 1st Ethernet Card & enable the 2nd Ethernet for the Internet..Eg : eth 0 = 192.168.1.1eth 1 = x.x.x.x (Public IP)I have check with few of my friends who told me to get Linux or Cent OS installed to do a interface disable after given time & enable a secondary device or virtual interface the next couple of seconds... Like eg : eth 1 = x.x.x.1 eth 2 = x.x.x.2 eth 3 = x.x.x.3 so on.. Would like the eth 1 to be down after 60 mins & eth 2 o be up & again after 60 mins of up time eth 2 down & eth 3 up.

View 6 Replies View Related

General :: Frame Based Vs Dialog Based

Apr 5, 2010

When you use an IDE and it asks you if you want frame based or dialog based, what is the difference?

View 1 Replies View Related

General :: Distro Should Use, Rpm Based Or Debian Based?

Feb 2, 2011

what distro should i use, rpm based or debian based?

View 2 Replies View Related

Fedora Security :: SSH Key Based Login Not Working On F11

Jul 20, 2009

I'm migrating my file server from Fedora 9 to Fedora 11 (clean install), and I'm having a horrendous time trying to get key based SSH logins working. I've set it up before, and I can't figure out why it won't work now. I copied my public key into ~/.ssh/authorized_keys2 and set the folder permissions for 700 and the file permissions for 600. Then I restarted sshd. Now unless I remember wrong I thought that's all you have to do. It didn't work. So I rebooted just for good measure. Still didn't work. So I made sure that my client was still sane. I can log into my OpenBSD machine just fine. I compared the sshd_config from OpenBSD to the Fedora one, and the options seem pretty close.

At that point I had nothing to lose and just started messing with the Fedora sshd_config. I also noticed in the config that the commented AuthorizedKeys file had dropped the 2 off the end, so I tried changing that as well. Still nothing. Password based logins work, but I really don't want to go that route. Now I can only think of two possibilities. One, some sshd_config setting is wrong and I don't know what it is. Two, there's some package that's required for key based logins that I accidentally unchecked during the install process. That's about all I can come up with. Here's my sshd_config, I tried to just set everything back to default.

Code:
#Port 22
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::

# Disable legacy (protocol version 1) support in the server for new
# installations. In future the default will change to require explicit
# activation of protocol 1
Protocol 2 .....

View 2 Replies View Related

Ubuntu Networking :: WiFi Web Based Login

Sep 1, 2011

I need to connect to a WiFI hotspot using web based login let me explain the steps that I follow to get connected in Windows and please let me know the steps to be followed in Ubuntu.

Steps that I follow in Windows

Step1: Scan for wireless network

Step2: Connect to the wireless network of my interest (unencrypted). At this point I am connected to the wireless network.

Step3: Open browser and type some website I am redirected or in some browsers need to click the warning to go to the NAC server and enter my login and paswword.

After successful login I can start browsing the Internet.Please let me know the steps to be followed in Ubuntu(scripts or CLI appreciated since I use Ratpoison).

View 1 Replies View Related

Server :: Which Ftp Client Will Support Key Based Login?

May 17, 2010

I have disabled password logins to a server.I want to transfer some files to it using a client like FileZilla but there was no way I could give private key to filezilla is there an ftp client
which supports key based login?

View 2 Replies View Related

Ubuntu :: Denying File Access In Windows?

May 3, 2010

use dual boot with win 7 and ubuntu 10.04, i installed Win7 first on one partition, and afterwards Ubuntu 10.04 on a second partition on the same drive. Now when i try to delete some files in windows like old games that where on a other harddrive it sais "You require permission from S-1-5-21-293015479-4145159318-3171105019-500 to make changes to this folder"How do i resolve the problem that ubuntu takes ownership over some folder/files

View 3 Replies View Related

Security :: Modsecurity - Switching From Logging To Denying

Apr 17, 2011

Just had ModSecurity with CRS installed for me on my hosted website, which I'm hardening after a recent hack. My site is a php-based user community with MySQL back end, so people register as members via php.

First, I'd like to properly log malicious activity Then I'd like to deny access where an attack looks likely Thing is, I'm not sure which /etc/apache2/modsecurity_crs modsecurity config files to tweak.then I can't even see my login page because I'm forbidden from the .php file it loads.I'm guessing I need to change rules individually but I have no idea how or which to change to stop attacks. The CRS documentation is just a bit too heavy to give me the basics.

View 5 Replies View Related

Ubuntu :: Text-based Web Browsers To Login To Site?

Jun 15, 2010

Im trying to find a text-based browser that would allow me to send my user and pass to a site so it would auto-login. The thing is, Im trying to grab text from a site that requires authentication.I have looked at lynx, but I have problems connecting to https (apparently, the site uses an invalid cert).

View 2 Replies View Related

Server :: More Than One Root User \ Manage Key Based Login?

Oct 21, 2010

So if I get their public key for ssh how do I add and then how do I delete it my problem is in .ssh/authorized_keys file I do not understand how to add and how to delete the key so that I can enable and disable root login this way.I am not sure as how do I comment the key assuming that the person sends me his public key then in .ssh/authorized_keysfile how do I add so that a comment can also be added so that I can identify that person as a legitimate user.

View 1 Replies View Related

Security :: How To Make PAM Give Message When Denying Ssh Access?

Oct 23, 2009

We use PAM to control access to our RHEL4 servers. We would like PAM to give a message, of our choice, when users who are not allowed to login try to login. PAM's default is to let the user try 3 times without any explanation.

View 7 Replies View Related

Ubuntu Servers :: Login Scipt Based On Group Membership

Mar 4, 2011

I have a script I want to execute after successful login for users who are members of a specific group. Ubuntu server 64 bit, 10.04. Where could I accomplish this?

View 5 Replies View Related

Ubuntu :: Firewall Enabled - Difference Between Rejecting / Denying Traffic?

Apr 3, 2011

I have installed the graphic user interface for IPtables and enabled this firewall. However, I find it a bit strange. What is the difference between rejecting and denying the traffic? If I want to configure IPtables as two-way, how can I define which of my apps can connect to the internet and which can't? If this firewall is enabled, does it really run in the background, protecting the user,or does it run only when its GUI is opened?

View 9 Replies View Related

Networking :: VSFTPD 2.2.2 On Ubuntu Lucid Denying Remote Access

Apr 28, 2011

My apologies if this is the wrong board for this thread, but seeing how the issue appears to be related to where I'm connecting from, I thought this would be the place to look.To start off, I've been running VSFTPD on the box for a good year or so now. Until recently, everything seemed to be working fine, but during the past few days I've run into issues with it and have been having trouble pin-pointing the problem. I've gone as far as reinstalling VSFTPD and rechecking every line in the conf file to no avail.The issue presents itself when I try to login to the FTP server remotely. The moment I put my user name in, I get disconnected without any error message, simply connection closed. That isn't the case when I'm connecting locally from the server.If I try to connect remotely using eth0 (internal network), it works fine again... but if I try eth1 (external network)... it fails. I'm thinking it might be related to PAM, but so far have been unable to figure out what I need to change in the configuration there. Additionally, the PAM log file doesn't show any activity if I'm connecting through eth1, but displays it if connecting through eth0.

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved