05-08-2002
6 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I was wondering, does anybody know if you have to set up a Linux machine as a server to establish it as a host for a FTP site; therefore enabling me to make contact with the linux machine, from other machine types, such as Solaris and Windows.
NB: I can currently ping the IP address from... (4 Replies)
Discussion started by: Breen
4 Replies
2. UNIX for Dummies Questions & Answers
Hi,
Can somebody help me with ldapsearch? I am a newbie with linux and trying to do a ldapquery to resolve a full name from Active Directory?
When i give the command ldapsearch -h sso541885 "cn=mloon"
I get the error "ldap_sasl_interactive_bind_s: can't contact ldap server
Regards,
... (6 Replies)
Discussion started by: vanloonmichel
6 Replies
3. Solaris
hi
when i configure for DHCP in my solaris it says not able to contact dhcp server..
what might be the problem( is there any problem in recognizing my hostname by DHCP Server)?
can any one explain
thanks in advance (1 Reply)
Discussion started by: srikanthg
1 Replies
4. Cybersecurity
How can I change my email address from text into an image? Someone told me that this way it won't be picked up by spam bots and it will reduce spam.
---------- Post updated 09-27-09 at 12:57 AM ---------- Previous update was 09-26-09 at 10:53 AM ----------
---------- Post updated at 12:58 AM... (0 Replies)
Discussion started by: iorgusu
0 Replies
5. Post Here to Contact Site Administrators and Moderators
I got the following message
I tried to send the following reply:Please excuse me for not being more familiar with this forums conventions. I was not aware that I included a personal message. Please help me by:
1. So that I can avoid this problem in the future, please let me know what part of my... (2 Replies)
Discussion started by: lmjennings44094
2 Replies
6. Web Development
Hi all,
My skills in Web Development are shaky at best.
What I want to do is have a simple form on my website.
User puts in name & email address -> verification email is sent to them to make sure it is really there email.
After this is confirmed, I want to send them a secure download like to... (1 Reply)
Discussion started by: fedora18
1 Replies
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)