06-10-2008
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All
I am doing a locate <file_name> on my Redhat 7 System. I am unable to get the output. All the keep getting is:
locate: this is not a vlaid slocate database: /var/lib/locate/slocate.db
What des this mean? Is my system compromised?
Thanks in advance.
KS (13 Replies)
Discussion started by: skotapal
13 Replies
2. Programming
hi,
when i try to compile, i got the following error message, what does it mean?
$gcc auto.cpp
/usr/tmp/ccmuE12B.o(.eh_frame+0x11): undefined reference to `__gxx_personality_v0'
collect2: ld returned 1 exit status
thanks (1 Reply)
Discussion started by: laila63
1 Replies
3. Shell Programming and Scripting
Good day.
I whant to put in a "readkey" function into my script. My script will be running in "real time". Basicaly I whant to add a eg. "Press X to exit" statement into my script. More or less like the read command, but I don't whant it to wait for the user to press enter. eg. Readkey. If no... (5 Replies)
Discussion started by: Blooper
5 Replies
4. AIX
Multipart question..
Can anybody explain why this happens :
-rw-rw-r-- 1 fnsw fnusr 1531061 Feb 13 21:45 filename1.log
-rw-rw-r-- 1 fnsw fnusr 1760706 Feb 10 22:10 filename2.log
-rw-rw-r-- 1 fnsw fnusr 1525805 Aug 16 2005 filename3.log
-rw-rw-r-- 1... (3 Replies)
Discussion started by: dbridle
3 Replies
5. Solaris
Hi all,
Thanks for any replies and for reading in advance.
We have upgraded one of our database instances to 10g on a Solaris 8 box, anyhow the other day it started trying to ping loads of weird IP addresses that we don't use, since our systems all run on pretty similar IP's. It all behind... (0 Replies)
Discussion started by: B14speedfreak
0 Replies
6. Shell Programming and Scripting
I had a similar script in solaris and it had no problem. I wrote this one in freeBSD and it gave me strange output. Can anyone please tell me why? thanks a lot
#!/bin/sh
#This is a shell script that checks file system capacity mounted on /home directory
#If file system is over 90% capacity,... (1 Reply)
Discussion started by: k2k
1 Replies
7. Shell Programming and Scripting
hello all,
i am having problem in accessing a directory.I dont think its a permission issue.can anyone help me out. I am using korn sell
code:
$ ls -ltr sc*
lrwxrwxrwx 1 essbase essbase 21 Oct 8 2010 sc_ssp -> /work/nfs/nas2/sc_ssp
$ cd sc_ssp
ksh: sc_ssp: not found
$ (6 Replies)
Discussion started by: manid
6 Replies
8. SuSE
Hello,
This is a programming question as well as a suse question, so let me know if you think I should post this in programming.
I have an application that I compiled under opensuse 12.2 using g77-3.3/g++3.3. The program compiles and runs just fine. I gave the application to a colleague who... (2 Replies)
Discussion started by: LMHmedchem
2 Replies
9. Red Hat
I am trying to install VirtualBox on RHEL 5 but I need the 32 bit version for 32 bit Windows. When I run yum I get the following:
sudo yum localinstall /auto/spvtg-it/spvss-migration/Software/VirtualBox-4.3-4.3.2_90405_el6-1.i686.rpm
Loaded plugins: fastestmirror
Setting up Local Package... (13 Replies)
Discussion started by: gw1500se
13 Replies
LEARN ABOUT REDHAT
grpunconv
PWCONV(8) System Manager's Manual PWCONV(8)
NAME
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups.
SYNOPSIS
pwconv
pwunconv
grpconv
grpunconv
DESCRIPTION
These four programs all operate on the normal and shadow password and group files: /etc/passwd, /etc/group, /etc/shadow, and /etc/gshadow.
pwconv creates shadow from passwd and an optionally existing shadow. pwunconv creates passwd from passwd and shadow and then removes
shadow. grpconv creates gshadow from group and an optionally existing gshadow. grpunconv creates group from group and gshadow and then
removes gshadow.
Each program acquires the necessary locks before conversion.
pwconv and grpconv are similiar. First, entries in the shadowed file which don't exist in the main file are removed. Then, shadowed
entries which don't have `x' as the password in the main file are updated. Any missing shadowed entries are added. Finally, passwords in
the main file are replaced with `x'. These programs can be used for initial conversion as well to update the shadowed file if the main
file is edited by hand.
pwconv will use the values of PASS_MIN_DAYS, PASS_MAX_DAYS, and PASS_WARN_AGE from /etc/login.defs when adding new entries to /etc/shadow.
Likewise, pwunconv and grpunconv are similiar. Passwords in the main file are updated from the shadowed file. Entries which exist in the
main file but not in the shadowed file are left alone. Finally, the shadowed file is removed.
Some password aging information is lost by pwunconv. It will convert what it can.
BUGS
Errors in the password or group files (such as invalid or duplicate entries) may cause these programs to loop forever or fail in other
strange ways. Please run pwck and grpck to correct any such errors before converting to or from shadow passwords or groups.
SEE ALSO
login.defs(5), grpck(8), pwck(8)
26 Sep 1997 PWCONV(8)