Lunarpages Web Hosting Forum

Author Topic: Question: How to Identify a Successful Hacking Attempt?  (Read 15882 times)

Offline The Natural Greek Phenomenon

  • Intergalactic Superstar
  • *****
  • Posts: 144
    • Smart Shopping Mall
Question: How to Identify a Successful Hacking Attempt?
« Reply #15 on: May 26, 2005, 03:36:05 AM »
Quote
If you are logged in as root, you can become any user just by typing the su command followed by the username. That is where the "substitute user" original comes from.


Now that makes perfect sense, thanks Peter.

Yes Abhilash how can I forget this su command
with all the privileges in it. Though "Super User" makes
more impact - like Super User of Any_User.

Offline PeterM

  • Spacescooter Operator
  • *****
  • Posts: 36
Question: How to Identify a Successful Hacking Attempt?
« Reply #16 on: May 26, 2005, 04:04:16 AM »
:thumb: you will now be dreaming about SU

Offline The Natural Greek Phenomenon

  • Intergalactic Superstar
  • *****
  • Posts: 144
    • Smart Shopping Mall
Question: How to Identify a Successful Hacking Attempt?
« Reply #17 on: May 26, 2005, 04:48:36 PM »
You bet I will :o ; SUperman.

Offline The Natural Greek Phenomenon

  • Intergalactic Superstar
  • *****
  • Posts: 144
    • Smart Shopping Mall
Question: How to Identify a Successful Hacking Attempt?
« Reply #18 on: May 26, 2005, 04:52:32 PM »
From now on any given time someone tells me "I am gonna su-e you" I'll be thinking not of courts but... mind control commands; until somebody pinches me.

Offline StephanieŽ

  • Master Jedi
  • *****
  • Posts: 1090
Question: How to Identify a Successful Hacking Attempt?
« Reply #19 on: May 30, 2005, 02:09:44 AM »
(su) will give you root access to run most system installs and work on sensitive files etc. I normally run as this in shell as it's safest, you don't actually switch user as your username will remain the same.

(su -) Is superuser and you would then be working as root with complete power mwha ha ha ha :P luv it ;)