08-26-2002
that means that after you login,
give the following command on the shell prompt
man mkdir
10 More Discussions You Might Find Interesting
1. IP Networking
32 bit IP addresses with class based allocation schemes have limitations. does anyone know where i could get some info on this or if you have time to spare and really want to help me, a couple of sentences.
thanks
milos (1 Reply)
Discussion started by: 30177005
1 Replies
2. UNIX for Dummies Questions & Answers
I am trying to use the csplit file on a file that contains records that have more than 2048 characters on a line. The resultant split file seems to ignore the rest of the line and I lose the data.
Is there any way that csplit can handle record lengths greater than 2048?
Thanks (0 Replies)
Discussion started by: ravagga
0 Replies
3. UNIX for Dummies Questions & Answers
I would like to set my minimum password length to on Linux and AIX.
However, doing this normally would only make it so newly added users will be affected by this. I would like for when I make this change, it either truncates everyone elses password, or prompts them to change it to 8+ characters.... (2 Replies)
Discussion started by: syndex
2 Replies
4. Solaris
Is there a limit to the number of LUNS that can be concatenated using Solaris Volume manager with Soft partitions?
I have worked with some AIX admins in the past and there was such a limitation therefore limiting the size the filesystem could grow to.
Is there such a limitation in Solaris 9... (6 Replies)
Discussion started by: BG_JrAdmin
6 Replies
5. UNIX and Linux Applications
I'm running a simulation (programmed in C) which makes calls to gnuplot periodically to plot data I have stored.
First I open a pipe to gnuplot and set it to multiplot:
FILE * pipe = popen("gnuplot", "w");
fprintf(pipe, "set multiplot\n");
fflush(pipe);
(this pipe stays open until the... (0 Replies)
Discussion started by: sedavidw
0 Replies
6. Shell Programming and Scripting
As part of a quiz assigned during my unix class I was asked to write a program to ask for a file name, print read errors, and "reverse elements in a list."
I used the 'tac' command in my solution, however, I was then lectured for 5 min about the "limitations" of the 'tac' command and how a 'for'... (6 Replies)
Discussion started by: 127.0.0.1
6 Replies
7. Red Hat
Hi,
I have noticed some performance issues on my RHEL5 server but the memory and CPU utilization on the box is fine.
I have a 1G full duplexed eth0 card and I am suspicious that this may be causing the problem. My eth0 settings are as follows:
Settings for eth0:
Supported ports: ... (12 Replies)
Discussion started by: Duffs22
12 Replies
8. Solaris
Hi,
I recently started working with Solaris, and what I noticed is that a lot of commands I used to regularly use don't work, like sed -i and grep -r. I have found work arounds for these problems though but it's a pain in the ass.
I'm just wondering why they decided not to include these handy... (4 Replies)
Discussion started by: Subbeh
4 Replies
9. Linux
In recently reading an article on linux basics before I embark and my personal installation project I came across this passage -
IDE drives have three types of partition: primary, logical, and extended. The partition table is located in the master boot record (MBR) of a disk. The MBR is the... (12 Replies)
Discussion started by: Synchlavier
12 Replies
10. UNIX for Beginners Questions & Answers
Guys: I have a customer using the 'pdftotext' utility under Linux. PDFs are received via email, converted to text, etc. and it has worked nicely for years. They received a PDF from a customer and the utility will not read it. The text file is created but it's either empty or has 1-2 bytes of... (23 Replies)
Discussion started by: kenlenard
23 Replies
CHSH(1) User Commands CHSH(1)
NAME
chsh - change login shell
SYNOPSIS
chsh [options] [LOGIN]
DESCRIPTION
The chsh command changes the user login shell. This determines the name of the user's initial login command. A normal user may only change
the login shell for her own account; the superuser may change the login shell for any account.
OPTIONS
The options which apply to the chsh command are:
-h, --help
Display help message and exit.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-s, --shell SHELL
The name of the user's new login shell. Setting this field to blank causes the system to select the default login shell.
If the -s option is not selected, chsh operates in an interactive fashion, prompting the user with the current login shell. Enter the new
value to change the shell, or leave the line blank to use the current one. The current shell is displayed between a pair of [ ] marks.
NOTE
The only restriction placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the superuser,
and then any value may be added. An account with a restricted login shell may not change her login shell. For this reason, placing /bin/rsh
in /etc/shells is discouraged since accidentally changing to a restricted shell would prevent the user from ever changing her login shell
back to its original value.
FILES
/etc/passwd
User account information.
/etc/shells
List of valid login shells.
/etc/login.defs
Shadow password suite configuration.
SEE ALSO
chfn(1), login.defs(5), passwd(5).
shadow-utils 4.5 01/25/2018 CHSH(1)