06-23-2006
I gave john has username
#./a.out users john ( command line )
users - group name
john - username
Thanks
narendra
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hello guys,
well as i mentioned first i have a serious problem, i need your help.
i have a hosting plan with linux, apache and php.
i have a script (that have my UID=32256) inside my web site (in the panel folder -see below-) that creates new scripts (in the pages folder) (the new scripts... (1 Reply)
Discussion started by: mehdi
1 Replies
2. AIX
We have a problem where we delete a user and their associated UID gets dumped back in the UID pool. The if we immediately create a another (new) user, AIX reuses the last UID, the one that was just released. This is causing a problem when reports are being generated because the new users name is... (2 Replies)
Discussion started by: xsys2000
2 Replies
3. UNIX for Advanced & Expert Users
Hi,
What is the best ways to keep UIDs and GIDs consistent across unix and linux server. my company have a servers running on hpux, linux, aix and many of them have veritas cluster and hacmp running, many time user account have been created only on one of the cluster node and not the others... (4 Replies)
Discussion started by: robertngo
4 Replies
4. Solaris
Hi all,
I am bit confused about UIDs on my server where LDAP athentication happens. UIDs are generally in the range of 0-65534 for any Solaris OS version(correct if i am wrong). My server is running on Solaris 9. Below are user accounts available on my server.
... (10 Replies)
Discussion started by: vvpotugunta
10 Replies
5. Shell Programming and Scripting
Hi,
Please anyone help to achive this using perl or unix scripting .
This is date in my table 20090224,based on the date need to check the files,If file exist for that date then increment by 1 for that date and check till max date 'i.e.20090301 and push those files .
files1_20090224... (2 Replies)
Discussion started by: akil
2 Replies
6. UNIX for Dummies Questions & Answers
I have a list of about 200,000 lines in a text file that look like this:
1 1 120
1 80 200
1 150 270
5 50 170
5 100 220
5 300 420
The first column is an identifier, the next 2 columns are a range (always 120 value range)
I'm trying fill in the values of those ranges, and remove... (4 Replies)
Discussion started by: knott76
4 Replies
7. Red Hat
Hi,
I'm considering implementing pam_krb5 on RHEL 5.5 and Solaris 10, and I'm in an environment that has a number of legacy NIS domains. They've all been migrated into Active Directory, RFC2307, with the NIS maps that differed in each domain kept within its own container. However, users and... (0 Replies)
Discussion started by: cambridge
0 Replies
8. Shell Programming and Scripting
Hi,
I have two files
file1 chr1_22450_22500
chr2_12300_12350
chr1_34500_34550
file2 11000_13000
15000_19000
33000_44000
If the file 1 ranges fall between file2 ranges then assign the value of file2 in column 2 to file1
output:
chr2_12300_12350 11000_13000
chr1_34500_34550 ... (7 Replies)
Discussion started by: Diya123
7 Replies
9. IP Networking
Greetings folks,
I have a rather lengthy list of banned IP ranges in iptables. Initially it was constructed as a rather ad-hoc affair, then later I discovered a site which had IP Block By Country lists, and imported several into iptables.
If possible, I'd like to be able to verify if the list... (0 Replies)
Discussion started by: putter1900
0 Replies
10. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Write a script that displays all usernames and their UIDs in the following fashion:
name1 uid=999
name2... (2 Replies)
Discussion started by: baniel
2 Replies
LEARN ABOUT DEBIAN
mailer
MAILER(8) System Manager's Manual MAILER(8)
NAME
mailer - script to warn users about their weak passwords
SYNOPSIS
mailer password-files
DESCRIPTION
This manual page documents briefly the mailer command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The mailer tool is useful to inform users which have been found to be using weak passwords by mail.
You should edit the message mailer will send to the users, but remember to copy the script to a safe place before editing it, as it's gen-
erally a bad idea to modify things living in /usr.
SEE ALSO
john(8), unafs(8), unique(8), unshadow(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 MAILER(8)