Finding Out About Oher Users on a Linux System

These commands are used to find out about other users on a *NIX host. When testing the security of a system covertly (such as when engaged in a penetration test) it is best to stop running commands when the system administrator is watching. These commands may also be useful for digital forensics investigators and incident response personnel.



Never miss a story from Craig Wright (Bitcoin SV is the original Bitcoin)