09-20-2007
Do you have physical access to the machine?
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I desperately wanted one of the UNIX Gurus to help me resolve my problem asap(I have to deliver the code to the client by Monday 08-oct).
I have a file with around 5 million records (50 lakhs). Now my original process was taking around 30 hours to read the complete file, process each and every... (4 Replies)
Discussion started by: kkumar1975
4 Replies
2. UNIX and Linux Applications
Hi,
In our product we have use binary that fork the child process to make proxy the connection to device.But recently when we try to connect new configured device several times it get handed and binary stop making further new connection to device.it required to RESTART the services to make binary... (1 Reply)
Discussion started by: Anand Prakash
1 Replies
3. Programming
Hi,
I try to write a C program which lists the output of a paticular command with all the available options (a to z) for the command in the directory of execution.
This program will generate the output if the option exists for the particular command else it will display some message saying... (9 Replies)
Discussion started by: ramkrix
9 Replies
4. Solaris
Hi
Can any one suggest me the instalation guideline for perl 5.8.9 on UNIX/solaris 2.8 environment.
Pooja (2 Replies)
Discussion started by: wadhwa.pooja
2 Replies
5. Solaris
Hi guys and ladies!
The application not found required fonts.
I checked, the packages SUNWi5rf, SUNWi5of are installed.
Then I checked availability the directories iso8859-5, iso8859_5 at /usr/openwin/lib/locale.
I checked after that.
% xlsfonts | grep "lucida-"
The system showed only ... (0 Replies)
Discussion started by: wolfgang
0 Replies
6. UNIX for Dummies Questions & Answers
Hello All,
I am application admin. I need to clear all the temporary files cleared by the applications. I need help/suggestion that is there any way to create a file system such that every Dir created in by any user will have 775 permissions. So, that i can simply clear the temporary file which... (6 Replies)
Discussion started by: firestar
6 Replies
7. UNIX for Advanced & Expert Users
Dear friends,
Before putting my questions forward, I would like to put some data infront of you, hope you will help me at the end.
This website
Cray-Cyber - Welcome
provides free access to many supercomputers and mainframe computers. When you login through ssh, they provide you with a screen,... (0 Replies)
Discussion started by: gabam
0 Replies
8. Programming
Dear friends,
Before putting my questions forward, I would like to put some data infront of you, hope you will help me at the end.
This website
Cray-Cyber - Welcome
provides free access to many supercomputers and mainframe computers. When you login through ssh, they provide you with a screen,... (5 Replies)
Discussion started by: gabam
5 Replies
9. Shell Programming and Scripting
Hi
Part of our security audit we found that following system account's had shells configured;
sync
halt
shutdown
I believe this can be achieved by following commands:
chsh -s /sbin/nologin (user)
usermod -s /sbin/nologin (user)
However, I would like simple script to... (5 Replies)
Discussion started by: Gamma
5 Replies
10. Programming
I am trying to compile thunar 1.8.4.
It is giving me this error.
configure: error: X Window system libraries and header files are required Ubuntu Mate 18.04 (2 Replies)
Discussion started by: drew77
2 Replies
chsh(1) General Commands Manual chsh(1)
NAME
chsh - change default login shell
SYNOPSIS
login-name [shell]
login-name [shell]
login-name [shell]
login-name [shell]
DESCRIPTION
The command changes the login-shell for a user's login name in the repository (see passwd(1)).
The DCE repository is only available if Integrated Login has been configured; see auth.adm(1M). If Integrated Login has been configured,
other considerations apply. A user with appropriate DCE privileges is capable of modifying a user's shell; this is not dependent upon
superuser privileges.
If the repository is not specified (as in [login-name]), the login shell is changed in the file only.
Run after running to make sure the information was processed correctly.
Notes
The command is a hard link to the command. When is executed, actually the command gets executed with appropriate arguments to change the
user login shell in the repository specified in command line. If no repository is specified, the login shell is changed in the file.
Arguments
login-name A login name of a user.
shell The absolute path name of a shell. If the file exists, the new login shell must be listed in that file. Otherwise, you
can specify one of the standard shells listed in the getusershell(3C) manual entry. If shell is omitted, it defaults to
the POSIX shell,
Options
The following option is recognized:
Specify the repository to which the operation is to be applied.
Supported repositories include and
Security Restrictions
You must have appropriate privileges to use the optional login-name argument to change another user's login shell.
NETWORKING FEATURES
NFS
File can be implemented as a Network Information Service (NIS) database.
EXAMPLES
To change the login shell for user to the default:
To change the login shell for user to the C shell:
To change the login shell for user to the Korn shell in the DCE registry:
WARNINGS
If two or more users try to write the file at the same time, a passwd locking mechanism was devised. If this locking fails after subse-
quent retrying, terminates.
AUTHOR
was developed by HP and the University of California, Berkeley.
FILES
SEE ALSO
chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
chsh(1)