{"id":229,"date":"2021-06-14T21:16:22","date_gmt":"2021-06-14T21:16:22","guid":{"rendered":"https:\/\/sfcompy.com\/blog\/?p=229"},"modified":"2021-12-01T19:53:41","modified_gmt":"2021-12-02T02:53:41","slug":"find-the-running-process-of-a-given-user-macos-cli","status":"publish","type":"post","link":"https:\/\/sfcompy.com\/blog\/find-the-running-process-of-a-given-user-macos-cli\/","title":{"rendered":"Find the Running Process of a Given User &#8211; MacOS CLI"},"content":{"rendered":"\n<p>It&#8217;s a great and simple security check tool to find which running process belongs to users that have never officially logged in or never got any authorization to log in. this will provide you some good idea about any hidden system resources consumed by the unofficially\\unauthorized logged-in User, resources such as CPU time, Memory, Network band\u2026etc<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"># replace the 'username' with the user name that you like to inspect\n&nbsp;\nbash&gt; au=($(ps -U username -o pid= ))\n\n# print the results \nbash&gt; echo $au\n\n# To get some idea about the specific process ID \n# (replace the pid_num with the pid number that you like to check)\n\nbash&gt; ps -vfM pid_num\n\nResult Example (pid=299): \n\n<img loading=\"lazy\" decoding=\"async\" width=\"1601\" height=\"71\" class=\"wp-image-238\" style=\"width: 786px;\" src=\"https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result.png\" alt=\"\" srcset=\"https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result.png 1601w, https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result-600x27.png 600w, https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result-300x13.png 300w, https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result-1024x45.png 1024w, https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result-768x34.png 768w, https:\/\/sfcompy.com\/blog\/wp-content\/uploads\/2021\/06\/sfcompy_ps_result-1536x68.png 1536w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" \/>\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s a great and simple security check tool to find which running process belongs to users that have never officially logged in or never got any authorization to log in. this will provide you some good idea about any hidden system resources consumed by the unofficially\\unauthorized logged-in User, resources such as CPU time, Memory, Network&#8230;<\/p>\n<p class=\"more-link-wrap\"><a href=\"https:\/\/sfcompy.com\/blog\/find-the-running-process-of-a-given-user-macos-cli\/\" class=\"more-link\">Read More<span class=\"screen-reader-text\"> &ldquo;Find the Running Process of a Given User &#8211; MacOS CLI&rdquo;<\/span> &raquo;<\/a><\/p>\n","protected":false},"author":2,"featured_media":231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64,61,51],"tags":[73,79,81,82,80,29],"_links":{"self":[{"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/posts\/229"}],"collection":[{"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":0,"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/media\/231"}],"wp:attachment":[{"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sfcompy.com\/blog\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}