04-15-2008
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Sorry to I am not familiar with script writing ,
attach is the /etc/profile in my system , we have limit each user can only have one login in the system . When the user login , if the system found the user have a dead process in the system , the system will confirm the user to kill the previous... (1 Reply)
Discussion started by: ust
1 Replies
2. Shell Programming and Scripting
Hello there,
I would like to know how can i prevent a normal user (not root user) from accessing his .profile and editing its information?
Also, how can i prevent this user from deleting a certain file named "script"?
Any help in that?
Thanks in advance, (3 Replies)
Discussion started by: charbel
3 Replies
3. UNIX for Dummies Questions & Answers
Hi Guys,
Im really new with this stuff...could anybody help to guide me ...how do i change/edit user profiile ? (2 Replies)
Discussion started by: gagasan_makmur
2 Replies
4. UNIX for Dummies Questions & Answers
I am looking for a way to issue a command or string of commands to repeatedly display new files that are written to the directory. I usually use ls -ltr to see the newest files at the bottom of the screen. I would like to automate this command to refresh what is displayed every second or so. Can... (3 Replies)
Discussion started by: skidude
3 Replies
5. UNIX for Dummies Questions & Answers
Hi, I want to know how can i find a user when he has logged in and how many times and days (2 Replies)
Discussion started by: darwinscp@hotma
2 Replies
6. IP Networking
Hi I want to know how can i find a user when he has logged in, at what time and how many days, anyone can help me (1 Reply)
Discussion started by: darwinscp@hotma
1 Replies
7. AIX
It's been a long time since I've done this and I can't remember which file is needed to edit. I would like to change the prompt for a user on my AIX 5.3 box, but I don't see a .profile file or a rc.ksh file to edit. Which file do I need to edit to get this? (1 Reply)
Discussion started by: bbbngowc
1 Replies
8. Infrastructure Monitoring
Hello
I really wonder what's trap in etc/profile and in each user .profile.
I try to google for it but I think I have no luck. Mostly hit is SNMP traps which I think it is not the same thing.
I want to know ...
1. What's a "trap 2 3" means and are there any other value I can set... (4 Replies)
Discussion started by: Smith
4 Replies
9. UNIX for Dummies Questions & Answers
I want to copy .Profile file from user1 homedirectoryto user2 homedirectory in Aix.
Please help me with the process. (4 Replies)
Discussion started by: Laxxi
4 Replies
LEARN ABOUT FREEBSD
newgrp
NEWGRP(1) BSD General Commands Manual NEWGRP(1)
NAME
newgrp -- change to a new group
SYNOPSIS
newgrp [-l] [group]
DESCRIPTION
The newgrp utility creates a new shell execution environment with modified real and effective group IDs.
The options are as follows:
-l Simulate a full login. The environment and umask are set to what would be expected if the user actually logged in again.
If the group operand is present, a new shell is started with the specified effective and real group IDs. The user will be prompted for a
password if they are not a member of the specified group.
Otherwise, the real, effective and supplementary group IDs are restored to those from the current user's password database entry.
EXIT STATUS
The newgrp utility attempts to start the shell regardless of whether group IDs were successfully changed.
If an error occurs and the shell cannot be started, newgrp exits >0. Otherwise, the exit status of newgrp is the exit status of the shell.
SEE ALSO
csh(1), groups(1), login(1), sh(1), su(1), umask(1), group(5), passwd(5), environ(7)
STANDARDS
The newgrp utility conforms to IEEE Std 1003.1-2001 (``POSIX.1'').
HISTORY
A newgrp utility appeared in Version 6 AT&T UNIX.
BUGS
For security reasons, the newgrp utility is normally installed without the setuid bit. To enable it, run the following command:
chmod u+s /usr/bin/newgrp
Group passwords are inherently insecure as there is no way to stop users obtaining the password hash from the group database. Their use is
discouraged. Instead, users should simply be added to the necessary groups.
BSD
February 8, 2013 BSD