06-18-2002
krishna, you are not a newcomer here, your post count is 40. This makes it even more disappointing when you break the rules. Please reread
the forum rules. And notice rule number 10:
Quote:
(10) Don't post your email address and ask for an email reply. The forums are for the benefit of all, so all Q&A should take place in the forums.
To solve your problem you will need to turn echo off. Then you will write a "*" for each character that you read. I do something very close to that in
this post.
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies
2. IP Networking
What is the command to change the mask to 255.255.255.0
The system was set up incorectly and the mask needs to be corrected (1 Reply)
Discussion started by: kkinnon
1 Replies
3. Shell Programming and Scripting
HP-UX 11i v2. #!/bin/sh
Hi all.
I have a flat file like this with lines like this:
|07/19/07|08:26AM|1|CupsCoffee|CupsCo|989898989 |Doe, John Y |THE PLUS CARD - Price| | |Y| | 2.00|
I would like to replace the id number (field 6) with a masked... (3 Replies)
Discussion started by: lyoncc
3 Replies
4. Shell Programming and Scripting
I have an requirement. There is a file which has the below contents
Unix|123|17-01-2010
....
....
....
....
and so an
now each letter has a corresponding predefined mapping letter in order to mask the original data.(for example U = A,
n=b, i=c, x=d, same like number 1=9,2=8,3=7. Also... (8 Replies)
Discussion started by: ksmbabu
8 Replies
5. UNIX for Dummies Questions & Answers
Hi All,
i am executing peoplesoft sqr command from unix prompt which has the unix id/password as parameter along with other parameters. i want to show whole command in log file but want to mask the id/password field. this command i am executing in shell script. Please suggest..
>sqr sqrname... (2 Replies)
Discussion started by: avi.coep
2 Replies
6. Red Hat
Hi Experts,
I'm using samba -3.6.1 on Red Hat Enterprise Linux ES release 4 (Nahant Update 8) ,all seems ok. The issue im facing is as follows.
When ever a user creates a file via windows explorer the permissions assgined to the file are as follows
-rw-rwxr--+ 1 tom group2 0 Mar 9... (1 Reply)
Discussion started by: maverick_here
1 Replies
7. UNIX for Dummies Questions & Answers
Hi Guys,
can someone explain what is mask and effective right mask in setfacl and
getfacl command with example, unable to get it. (3 Replies)
Discussion started by: Jcpratap
3 Replies
8. Shell Programming and Scripting
Hi All,
I have a script, which prompts me for my password input, then it passes that password onto an argument for another script which is then passed onto an expect script which automates my logins to a bunch of servers to execute my commands.
example.
script A - request for password,... (7 Replies)
Discussion started by: aixkidbee
7 Replies
9. Shell Programming and Scripting
Hi Guys, I'm not an expert so seeking advice on awk.
I need to mask numbers in a text field so that they show up as "*" except for the last 4.
Input:
Desired Output:
The part of the Code I am using gives me this Output
num=$(echo $num | awk 'BEGIN{FS=OFS=""}{for (i=1 ; i<=NF-4; i++)... (4 Replies)
Discussion started by: aster007
4 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT REDHAT
shadow
SHADOW(5) File Formats Manual SHADOW(5)
NAME
shadow - encrypted password file
DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is
Login name
Encrypted password
Days since Jan 1, 1970 that password was last changed
Days before password may be changed
Days after which password must be changed
Days before password is to expire that user is warned
Days after password expires that account is disabled
Days since Jan 1, 1970 that account is disabled
A reserved field
The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 character alphabet a thru z, A thru
Z, 0 thru 9, . and /. Refer to crypt(3) for details on how this string is interpreted.
The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the
proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater
than the maximum number of day allowed, this password may not be changed by the user.
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass-
word expires. An account will also be disabled on the specified day regardless of other password expiration information.
This information supercedes any password or password age information present in /etc/passwd.
This file must not be readable by regular users if password security is to be maintained.
FILES
/etc/passwd - user account information
/etc/shadow - encrypted user passwords
SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8)
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
SHADOW(5)