• 7) View the Users
  • 8) Finger Command
  • 9) Cron Command
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet155/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   151   152   153   154   155   156   157   158   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    6) Delete a group
    Like the user system, it is also productive to delete the user groups if there
    is no use of it anymore. Hackers too evidently use this command to wipe
    out a set of user groups that they find easy to be get traced. 
    Below is the command to delete a user group: 
    linuxexample @ host : groupdel GID 3453
    Remember that every directory and information that is present and related
    to every user will be wiped off. There are very fewer chances of getting the
    data back unless one uses professional backup and recovery tools.
    7) View the User's 
    There is a special command in Linux called uses that can be used to check
    all the users that are present in the system no matter if they are alive or not
    at the moment. 
    Here is the command with an output for the user's command 
    linuxexample @ host : view UI D
    Output:
    2443 sample1
    8942 example


    0987 admin
    -----
    -----
    -----
    ----
    4673 systemuser
    8) Finger Command
    Finger command is used differently and is used to find the awake user or
    group systems at the present moment. This can be highly beneficial when
    performing complex system tasks.
    Below is the command for the finger functionality with an output:
    linuxexample @ host : finger UID
    Output:
    2443 sample1
    8942 exampl e
    9) Cron Command
    Linux system runs on services. Services are basic tasks that can be used by
    operating systems to perform their desired tasks. Cron command is a special
    set of commands that can be used to automate tasks like starting an
    antivirus automatically when you boot up the system or switching into a
    VPN profile when accessing a particular software.
    Below we explain with an example about cron command in detail: 
    service crond start
    This starts the cron service and lets us run things.
    Service crond status
    With this command, you can easily check what is going on.


    All of these tasks will be stored in the /etc/crontab directory.
    By this, we have explained a detailed explanation about the Linux user
    management system and in the next section, we will in detail explain about
    file management system which is one of the most pioneer branches that a
    hacker should be perfect at. Let us go!

    Download 6,34 Mb.
    1   ...   151   152   153   154   155   156   157   158   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish