Sponsored Content
Full Discussion: default unix accounts
Top Forums UNIX for Dummies Questions & Answers default unix accounts Post 302195356 by Smiling Dragon on Wednesday 14th of May 2008 10:17:16 PM
Old 05-14-2008
No such thing, but if you send your full name and contact details to the cyber-crime division of your local police force, I'm sure they will be happy to help you out. Smilie
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Deleting some mails from Unix mail accounts

Hi there, Is there a way to delete some messages from the mail account on a Unix machine via a script?. Regards (0 Replies)
Discussion started by: JimJim
0 Replies

2. UNIX for Dummies Questions & Answers

what is the default password for those build-in accounts?

what is the default password for those build-in accounts, such as adm, sys, dhcp, oracle, guest? if not set, can they be used to login? is that a security problem? how are they designed to be used? thanks! (5 Replies)
Discussion started by: fredao
5 Replies

3. UNIX for Advanced & Expert Users

Clearing down old and dormant UNIX accounts

Hi Guys, First of all apologies if this is in the wrong topic. I have been given a task of coming up with an approach to identify unix accounts that are no longer in use by the user and applications, and need some ideas to of how to go about this. These accounts application accounts that... (2 Replies)
Discussion started by: Frankie123
2 Replies

4. UNIX for Dummies Questions & Answers

System list of all UNIX login accounts

What is the command to list all UNIX system login accounts? What is the command to list all system password parameters for UNIX(minimum length, complexity,age, invalid lockout attempts, expiration date , user inactivity lockout) (1 Reply)
Discussion started by: ma466
1 Replies

5. Shell Programming and Scripting

New To UNIX - Need Script to create report of user & group accounts

Hi, I'm new to the world of UNIX and have been asked to create a complex script (at least complex to me:confused:) for AIX UNIX to create a report of all the users on the server including server, user, UID, groups, GID, etc. Found a script using lsuser, but the output is still lacking. 2 things I... (2 Replies)
Discussion started by: panthur
2 Replies

6. Shell Programming and Scripting

How to change passwords for User accounts on multiple UNIX/Linux machines remotely?

Hello Experts, Need some direction on creating shell script for following environment: We have about 20 people in the team working as Oracle DBA's (sysdba's and appdba's). Total Servers which is a mix of Unix and Linux are 200. We do not have Root user access on any of the servers and... (3 Replies)
Discussion started by: sha2402
3 Replies

7. UNIX for Advanced & Expert Users

How can I send a mail from my outlook or other mail accounts to UNIX server?

Hi all, I want to send a mail for my business needs from outlook account to an unix server (HP-UX) but I don't send any mail. While I can send from the unix server to my outlook account, I can't send from outlook to unix. How can I achieve this ? How can I send a mail from my outlook or other... (2 Replies)
Discussion started by: igelegin
2 Replies

8. UNIX for Advanced & Expert Users

UNIX keytab file and service accounts

we are using kerberos authentication for the Oracle database. For automation jobs we are adding service accounts to keytab. does anybody using Kerberos authentication for jobs running through CORN ? if so , how you are getting passwords for service accounts ? if anyone has ideas please share. ... (0 Replies)
Discussion started by: talashil
0 Replies
Policing action in tc(8)                                               Linux                                              Policing action in tc(8)

NAME
police - policing action SYNOPSIS
tc ... action police rate RATE burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ] [ peakrate RATE ] [ overhead BYTES ] [ linklayer TYPE ] [ CONTROL ] tc ... filter ... [ estimator SAMPLE AVERAGE ] action police avrate RATE [ CONTROL ] CONTROL := conform-exceed EXCEEDACT[/NOTEXCEEDACT EXCEEDACT/NOTEXCEEDACT := { pipe | ok | reclassify | drop | continue | goto chain CHAIN_INDEX } DESCRIPTION
The police action allows to limit bandwidth of traffic matched by the filter it is attached to. Basically there are two different algo- rithms available to measure the packet rate: The first one uses an internal dual token bucket and is configured using the rate, burst, mtu, peakrate, overhead and linklayer parameters. The second one uses an in-kernel sampling mechanism. It can be fine-tuned using the estimator filter parameter. OPTIONS
rate RATE The maximum traffic rate of packets passing this action. Those exceeding it will be treated as defined by the conform-exceed option. burst BYTES[/BYTES] Set the maximum allowed burst in bytes, optionally followed by a slash ('/') sign and cell size which must be a power of 2. mtu BYTES[/BYTES] This is the maximum packet size handled by the policer (larger ones will be handled like they exceeded the configured rate). Setting this value correctly will improve the scheduler's precision. Value formatting is identical to burst above. Defaults to unlimited. peakrate RATE Set the maximum bucket depletion rate, exceeding rate. avrate RATE Make use of an in-kernel bandwidth rate estimator and match the given RATE against it. overhead BYTES Account for protocol overhead of encapsulating output devices when computing rate and peakrate. linklayer TYPE Specify the link layer type. TYPE may be one of ethernet (the default), atm or adsl (which are synonyms). It is used to align the precomputed rate tables to ATM cell sizes, for ethernet no action is taken. estimator SAMPLE AVERAGE Fine-tune the in-kernel packet rate estimator. SAMPLE and AVERAGE are time values and control the frequency in which samples are taken and over what timespan an average is built. conform-exceed EXCEEDACT[/NOTEXCEEDACT] Define how to handle packets which exceed or conform the configured bandwidth limit. Possible values are: continue Don't do anything, just continue with the next action in line. drop Drop the packet immediately. shot This is a synonym to drop. ok Accept the packet. This is the default for conforming packets. pass This is a synonym to ok. reclassify Treat the packet as non-matching to the filter this action is attached to and continue with the next filter in line (if any). This is the default for exceeding packets. pipe Pass the packet to the next action in line. EXAMPLES
A typical application of the police action is to enforce ingress traffic rate by dropping exceeding packets. Although better done on the sender's side, especially in scenarios with lack of peer control (e.g. with dial-up providers) this is often the best one can do in order to keep latencies low under high load. The following establishes input bandwidth policing to 1mbit/s using the ingress qdisc and u32 fil- ter: # tc qdisc add dev eth0 handle ffff: ingress # tc filter add dev eth0 parent ffff: u32 match u32 0 0 police rate 1mbit burst 100k As an action can not live on it's own, there always has to be a filter involved as link between qdisc and action. The example above uses u32 for that, which is configured to effectively match any packet (passing it to the police action thereby). SEE ALSO
tc(8) iproute2 20 Jan 2015 Policing action in tc(8)
All times are GMT -4. The time now is 11:05 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy