home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Speccy ClassiX 1998
/
Speccy ClassiX 98.iso
/
amiga_system
/
the_aminet
/
comm
/
bbs
/
u342q07.lha
/
u_clog.lha
/
clog.doc
< prev
Wrap
Text File
|
1993-08-09
|
2KB
|
53 lines
CLOG
CLOG provides access to the userlog for the Sysop. To use it, the file
CTDLTABL.SYS must exist, and so must be CTDLLOG.SYS.
There are two ways of using CLOG. First, there is the simple call:
$ CLOG
This will print out on the console the list of users in the file as they
appear in the file. The user of this program should be warned that
Citadel does not put new users into the userlog in sequential order.
Instead, they are hashed into the log. Usually, first user to log into
the system ends up occupying the last position in the file! In general,
users are sprinkled everywhere, so don't be alarmed if nothing shows up
right away. Be patient.
In any case, the list is printed out as follows. First, the log
position will be printed out, which will always be in sequential order.
If nobody occupies that position, then CLOG proceeds to the next log
position. If somebody does occupy that position, then the name of that
person (or alias) will be printed out, followed by his/her status as
aide, expert/non-expert, screen width, and if they have net privileges
the entry will be followed by a 'N'.
The second way to use CLOG is to give it arguments. There are two
arguments currently available in the MS-DOS version. The first is the
"-P" argument:
$ CLOG -P
This will cause the passwords to be listed along with the user's name.
This is useful if somebody forgets their password.
An optional second argument is a user's name. When a user's name
appears on the command line, then data for that account only will be
shown. You may use -P and a user's name on the same command line.
$ CLOG -P "SANTA CLAUS"
If, for some reason, the sysop wants a list to be put out to a file,
use the re-direction commands. If you want the list to be put out
to the file LOG.LST, the type
$ CLOG >LOG.LST
Note: For security sake, you should be very careful with what files
your users have access to. If a user should get your CTDLTABL.SYS and
the CTDLLOG.SYS, they could use this program to gain access to all the
users on your system. Do not create directory rooms with access to these
files.