473,387 Members | 1,548 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Log of login and files access on fedora

Hello Linux Guru

I am facing very serious issues of begin spying.

I am sure of that. Idiots are doing that.

But I am not very well in linux, so i cannot get the log of that.

can you tell me how to find trace of file accessed, who is login, who logged when, etc.

How to check telnet. Can I disable telnet on my system, so no one can telnet at my system. Can this will affect login from remote?

I have root password.

Thanks!
Mar 17 '07 #1
5 5986
arne
315 Expert 100+
Hello Linux Guru

I am facing very serious issues of begin spying.

I am sure of that. Idiots are doing that.

But I am not very well in linux, so i cannot get the log of that.

can you tell me how to find trace of file accessed, who is login, who logged when, etc.

How to check telnet. Can I disable telnet on my system, so no one can telnet at my system. Can this will affect login from remote?

I have root password.

Thanks!
Most of the things happening on your system should be reflected in /var/log/messages. But good (or evil) crackers know that, of course, and will manipulate that once they have access.

Port 23 is usually used for telnet, see /etc/services. Try 'telnet localhost 23' to see if your telnet port is open. You can try this with all ports, like 23 for ssh, 25 for smtp and so on.

See also 'man telnet'.
Mar 17 '07 #2
Most of the things happening on your system should be reflected in /var/log/messages. But good (or evil) crackers know that, of course, and will manipulate that once they have access.

Port 23 is usually used for telnet, see /etc/services. Try 'telnet localhost 23' to see if your telnet port is open. You can try this with all ports, like 23 for ssh, 25 for smtp and so on.

See also 'man telnet'.
I tried telnet localhost 25 and it printed some messages.

I could not understand/find anything in "message".

When I tried "telnet localhost 23", it looks it is closed.

but in "25", it printed some message and it became ready for accepting input.
and now terminal is not starting.
Mar 17 '07 #3
arne
315 Expert 100+
I tried telnet localhost 25 and it printed some messages.

I could not understand/find anything in "message".

When I tried "telnet localhost 23", it looks it is closed.

but in "25", it printed some message and it became ready for accepting input.
and now terminal is not starting.
Well, if you connect with telnet to a port, you need to know the protocol of ssh, smtp or whatever you're talking to. 25 is typically the SMTP port, so you're probably connected to an SMTP daemon. Try typing 'quit' :)

What do you mean "terminal is not starting"? STMP will give you no terminal.
Mar 17 '07 #4
Motoma
3,237 Expert 2GB
Hello Linux Guru

I am facing very serious issues of begin spying.

I am sure of that. Idiots are doing that.

But I am not very well in linux, so i cannot get the log of that.

can you tell me how to find trace of file accessed, who is login, who logged when, etc.

How to check telnet. Can I disable telnet on my system, so no one can telnet at my system. Can this will affect login from remote?

I have root password.

Thanks!
If you have no trace of someone logging into your system, how (other than paranoia) are you sure that it is happening? Often, failed (and sometimes successful) login attempts are recorded daily, and emailed to the root account. Try accessing mail as root and seeing if you have any access logs.
Mar 20 '07 #5
arne
315 Expert 100+
I am facing very serious issues of begin spying.
You may also want to have a look into 'tripwire' in order to detect an intrusion.
Mar 21 '07 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

6
by: andRea | last post by:
Hi all! Anybody knows how is possible detect the Novell login in Access? Thank you all andRea
8
by: lightcap | last post by:
Server Windows 2003. Created one web site, everything works fine. Copied the content to another folder and created another web site pointing to the copied contecnt for test purposes. Configuration...
2
by: Chris Newby | last post by:
After googling this I got lots of information and tried a few different things. However pages for a particular site are still consistantly failing with "Access Denied to C:\ ... \Temporary Asp.Net...
9
bhing
by: bhing | last post by:
hiya everyone!!! i would like to know if theres a third party software or some configuration in order to backup some files from fedora 5 to red hat 9.. they are in separate computer. And i would...
6
by: cyndithomas via AccessMonster.com | last post by:
I new to Visual Basic and am struck on a issue. Have created a Login in Screen for Remote User to access and input data. Want the Remote to be able to login & access the Input Form, and Manager...
13
by: silmana | last post by:
hi again, i am done with the login form everything works fine so i just want to know how to make the welcomein.php private?? i am working on a community so you would know what i mean could some one...
2
by: gangac | last post by:
I am currently working on an ms access application for a large insurance company which generates reports for the user after the user inputs/select some data.... Unfortunately the application has...
0
by: Aussie Rules | last post by:
Hi, I am using vb.net 2008, with a crystal report. I created a report in an empty project and was able to run it OK in that project. In my normal vb.net project, I have included the .rpt...
3
by: ragazzo | last post by:
Hi, I am using this code in access form to list everything in directory but it did`not show hidden or system files. how works this code to list all files include hidden or system files.? Private...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.