Sponsored Content
Full Discussion: password mask in C
Top Forums Programming password mask in C Post 23184 by Perderabo on Tuesday 18th of June 2002 08:31:10 AM
Old 06-18-2002
krishna, you are not a newcomer here, your post count is 40. This makes it even more disappointing when you break the rules. Please reread the forum rules. And notice rule number 10:
Quote:
(10) Don't post your email address and ask for an email reply. The forums are for the benefit of all, so all Q&A should take place in the forums.
To solve your problem you will need to turn echo off. Then you will write a "*" for each character that you read. I do something very close to that in this post.
 

10 More Discussions You Might Find Interesting

1. IP Networking

Subnet mask

Hi, I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies

2. IP Networking

Changing the mask

What is the command to change the mask to 255.255.255.0 The system was set up incorectly and the mask needs to be corrected (1 Reply)
Discussion started by: kkinnon
1 Replies

3. Shell Programming and Scripting

mask ID number

HP-UX 11i v2. #!/bin/sh Hi all. I have a flat file like this with lines like this: |07/19/07|08:26AM|1|CupsCoffee|CupsCo|989898989 |Doe, John Y |THE PLUS CARD - Price| | |Y| | 2.00| I would like to replace the id number (field 6) with a masked... (3 Replies)
Discussion started by: lyoncc
3 Replies

4. Shell Programming and Scripting

Need to Mask Data

I have an requirement. There is a file which has the below contents Unix|123|17-01-2010 .... .... .... .... and so an now each letter has a corresponding predefined mapping letter in order to mask the original data.(for example U = A, n=b, i=c, x=d, same like number 1=9,2=8,3=7. Also... (8 Replies)
Discussion started by: ksmbabu
8 Replies

5. UNIX for Dummies Questions & Answers

how to mask the password ?

Hi All, i am executing peoplesoft sqr command from unix prompt which has the unix id/password as parameter along with other parameters. i want to show whole command in log file but want to mask the id/password field. this command i am executing in shell script. Please suggest.. >sqr sqrname... (2 Replies)
Discussion started by: avi.coep
2 Replies

6. Red Hat

Samba create mask and dir mask on RHEL 4.8

Hi Experts, I'm using samba -3.6.1 on Red Hat Enterprise Linux ES release 4 (Nahant Update 8) ,all seems ok. The issue im facing is as follows. When ever a user creates a file via windows explorer the permissions assgined to the file are as follows -rw-rwxr--+ 1 tom group2 0 Mar 9... (1 Reply)
Discussion started by: maverick_here
1 Replies

7. UNIX for Dummies Questions & Answers

What is mask and effective right mask in setfacl?

Hi Guys, can someone explain what is mask and effective right mask in setfacl and getfacl command with example, unable to get it. (3 Replies)
Discussion started by: Jcpratap
3 Replies

8. Shell Programming and Scripting

Bash scripting mask password from ps

Hi All, I have a script, which prompts me for my password input, then it passes that password onto an argument for another script which is then passed onto an expect script which automates my logins to a bunch of servers to execute my commands. example. script A - request for password,... (7 Replies)
Discussion started by: aixkidbee
7 Replies

9. Shell Programming and Scripting

awk help to mask characters

Hi Guys, I'm not an expert so seeking advice on awk. I need to mask numbers in a text field so that they show up as "*" except for the last 4. Input: Desired Output: The part of the Code I am using gives me this Output num=$(echo $num | awk 'BEGIN{FS=OFS=""}{for (i=1 ; i<=NF-4; i++)... (4 Replies)
Discussion started by: aster007
4 Replies

10. Forum Support Area for Unregistered Users & Account Problems

Password sent via reset password email is 'weak' and won't allow me to change my password

I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login. Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
acceptable_password(3)					     Library Functions Manual					    acceptable_password(3)

NAME
acceptable_password - Determines if a password meets deduction requirements (Enhanced Security) LIBRARY
Security Library - libsecurity.so SYNOPSIS
int acceptable_password( char *word, FILE *stream); PARAMETERS
Points to the suggested password. Points to the stream to write diagnostics into. DESCRIPTION
The acceptable_password() function determines if the given password is difficult to deduce from well known, password-guessing heuristics. The cleartext (plaintext) password is passed as the first argument, and the file pointer of the stream that is used to report failure rea- sons is the second argument. If this checking is to be silent, the second argument should be a null file pointer. When the acceptable_password() function returns a value of 1, the password provided meets all the tests listed in the following text. When it returns a value of 0 (zero), the password failed to meet at least one of the tests. The selectivity criteria for the password include but cannot be limited to the following four tests: This test passes if the word is not a palindrome. (A palindrome is a word that is spelled the same backwards as it is forwards.) Examples of palindromes that fail this test are mom, dad, noon, redivider, radar. Palindromes do not make good passwords because they reduce an n character password to n/2 + 1 char- acters. A penetrator knowing that palindromes were legal could use heuristics that could deduce the password much more quickly than if they were excluded. This test passes if the password is not a derivative of a login name for the system. Many insecure systems allow passwords to be the login name itself. This is a fact known by many penetrators. All login names are excluded because a user that is the owner of several pseudouser accounts can elect to use the login name of one account as the password for all accounts. Similar to the login name issue, this test passes if the password is not a group name derivative. This test passes if the spell program determines that the password is not an English word. A penetrator then could not search the online dictionary to find the password. The spell program also has some built-in rules that go beyond the actual online dictionary in determining what is a proper word, and this routine takes advantage of that. NOTES
Programs that use this routine must be compiled with -lsecurity. FILES
System password file. System group file. RELATED INFORMATION
Functions: getpwent(3), getgrent(3). Commands: spell(1). delim off acceptable_password(3)
All times are GMT -4. The time now is 04:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy