04-26-2008
Interesting redirection, I'd like to experiment with it and do a little more tweaking. thanks so much for your input. In addition to the Admin Account, I'm also thinking about the guest account which is below 200. Disabling it is not enough, it's a nice addition to Apple's new OS, but this poses possible questions if not regulated in a controlled environment.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
:o
! HELLO SIR,
1) In UNIX how to hide & unhide a file. What are the Commands are there .
-----------
:confused:
2) One more thing is that when i using WILD CARDS .The commands are not working Properly. Why like that.
Please help me . (3 Replies)
Discussion started by: smdakram
3 Replies
2. UNIX for Dummies Questions & Answers
Is there a way to easily change an account to be a non login account (NP in the shadow) file?
I know I can just edit the file but that is not what we want to do. We use access control software and want to provide a way to set an account to be non-login using simple commands that can be mapped... (0 Replies)
Discussion started by: LordJezo
0 Replies
3. UNIX for Dummies Questions & Answers
I have access to 15+ UNIX boxes at work, and I do not consistently log onto all of them over time. When I do try to access one I havent been on in awhile, my account is locked as the password has expired.
I need to request to the UNIX SA's that the password expiration is 90 days and that if it... (1 Reply)
Discussion started by: stringzz
1 Replies
4. What is on Your Mind?
Hello Unix Experts,
I'm going to be graduating with a CIS (Computer Information Systems) degree in the coming year. I have been offered an internship with a job title of Unix Administrator under a well known company. I understand that Unix is used for high-end servers in many large... (1 Reply)
Discussion started by: brentmd24
1 Replies
5. Linux
Hi ,
I am faceing lot of problem due to "disk space is not enough".
senerio is like as,
In system has 5 account.
a,b,c,d,e
say account c if very critical.
Due to other user's data, user 'c' is faceing disk space issue.
I want to dedicate 3 GB for user 'c'.
No user... (1 Reply)
Discussion started by: ashokd009
1 Replies
6. Forum Support Area for Unregistered Users & Account Problems
Hi there,
I may have had a typo in my email previously provided. I have doublechecked my email for Scott's reply but havent seen it, so I am creating a new post.
My new email can be either one of these: <removed> or <removed>
I beleive my old email was <removed by admin>
thanks for your... (1 Reply)
Discussion started by: AKelam_MagnusA
1 Replies
7. How to Post in the The UNIX and Linux Forums
I have made password less connection to my remote account. and i tried to execute commands at a time. but i am unable to execute the commands.
ssh $ACCOUNT_DETAILS@$HOST_DETAILS
cd ~/JEE/*/logs/ (1 Reply)
Discussion started by: kishored005
1 Replies
8. Windows & DOS: Issues & Discussions
Hello,
Does anyone know what happens to your skype account if you close the outlook.com email account which are linked together? As you know they are both owned by Microsoft.
Thanks (0 Replies)
Discussion started by: milhan
0 Replies
9. UNIX for Beginners Questions & Answers
I want to create a shell script to gather user account information and displays the result to administrator.
I have created a script but its showing all the information when i search for username like:
amit@mx:~$ ./uinfo.sh amit
Username : amit
User Info ... (2 Replies)
Discussion started by: amit1986
2 Replies
passwd(4) Kernel Interfaces Manual passwd(4)
NAME
passwd - Password files
DESCRIPTION
A passwd file is a file consisting of records separated by newline characters, one record per user, containing seven colon (:) separated
fields. These fields are as follows:
User's login name. The default length is 8 characters. User's encrypted password. User's ID User's login group ID General information
about the user User's home directory User's login shell
The name field is the login used to access the computer account, and the uid field is the number associated with it. They should both be
unique across the system (and often across a group of systems) since they control file access.
While it is possible to have multiple entries with identical login names and/or identical user gid's, it is usually a mistake to do so.
Routines that manipulate these files will often return only one of the multiple entries, and that one by random selection.
The login name must never begin with a hyphen (-); also, it is strongly suggested that neither uppercase characters or dots (.) be part of
the name, as this tends to confuse mailers. No field may contain a colon (:) as this has been used historically to separate the fields in
the user database.
The password field is the encrypted form of the password. If the password field is empty, no password is required to gain access to the
machine. Because these files contain the encrypted user passwords, they should not be readable by anyone without appropriate privileges.
Use the command to edit password entries. This ensures that the hashed password database is rebuilt. If you have enhanced security
installed on your system, the password field contains an asterisk (*). The encrypted password is stored in the user's protected password
database.
The gid field is the group that the user will be placed in upon login. Since the operating system supports multiple groups (see the groups
command) this field currently has little special meaning.
The gecos field normally contains comma (,) separated subfields as follows:
User's full name User's office number User's work phone number User's home phone number
This information is used by the finger command.
The user's home directory is the full UNIX pathname where the user will be placed on login.
The shell field is the command interpreter the user prefers. If the shell field is empty, the Bourne shell (/bin/sh) is assumed.
The allowable values for the UID are unsigned numbers from 0 to 65535.
The command pwck can be used to verify the accuracy of data entered in the passwd file.
EXAMPLES
root:TZVtfX5VbS3KY:0:1:System PRIVILEGED Account,,,:/:/bin/sh adm:*:5:16:Admin Login:/usr/adm:/bin/sh operator:HdgoklKwZOlvU:25:28:System
PRIVILEGED Account,,,:/etc/operator: guest:Nologin:-2:-2:anonymous NFS user:/:/bin/date osfuser:If2eoZ6gmghJo:50002:15:Osf
User:/usr/users/osfuser:/bin/csh marcy:*:201:20:Marcy Swanson,dev,x1234:/usr/users/marcy:/bin/sh
RELATED INFORMATION
Functions: getpwent(3)
Commands: login(1), passwd(1), pwck(8), vipw(8)
Files: prpasswd(4) delim off
passwd(4)