07-01-2008
How to delete a user account in linux bases application.
Hi,
Can anyone please guide me how can I remove/block a user from a server access.
/usr/sbin/adduser -d /home/john john
echo ****** | passwd --stdin john
I used the above command to add a user "john". How do I delete and block john.
Appreciate your responses.
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Got the answer as it can be done using yast tool in SUSE linux (0 Replies)
Discussion started by: jambesh
0 Replies
2. UNIX for Dummies Questions & Answers
You guys tell me. Am I wrong on this one? If so, where is the hole in my thoughts?
Thanks,
Duke
Specs:
Solaris version of Unix
"ROOT" primary group is "other" (GID = 1)
Application account (not system account) is assigned to the "other" GID (1).
Issue:
Application... (3 Replies)
Discussion started by: F150 Duke
3 Replies
3. UNIX for Dummies Questions & Answers
I am an administrator of a Red Hat Enterprise Linux system.
Now one account expired. I wonder how to reactivate the account.
Thanks (2 Replies)
Discussion started by: cy163
2 Replies
4. UNIX and Linux Applications
Hi,
Can anyone please guide me how can I remove/block a user from a server access.
/usr/sbin/adduser -d /home/john john
echo ****** | passwd --stdin john
I used the above command to add a user "john". How do I delete and block john.
Appreciate your responses.... (2 Replies)
Discussion started by: sureshcisco
2 Replies
5. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (3 Replies)
Discussion started by: avklinux
3 Replies
6. Red Hat
How can I use the command "startx" by other user account such as "oracle" ??
I cannot startx by user account oracle ??
How to fix it ???
Any adivce ???
I use red hat linux kernel 2.6
$ startx
Fatal server error:
PAM authentication failed, cannot start X server.
Perhaps you do... (0 Replies)
Discussion started by: chuikingman
0 Replies
7. Red Hat
Hi,
I have to move user account from solaris to Linux environment because I don't want user to create password again in Linux environment, so could somebody confirm me how to do it, I know there are files /etc/groups, /etc/passwd and /etc/shadows need to copy but somebody confirm me what is the... (2 Replies)
Discussion started by: mnaumanca
2 Replies
8. Shell Programming and Scripting
good evening .. I have a plea, who I can help me with a management application user rights on the files in a Unix / Linux
I need for college .. .. and not told us no clue .. thank you (1 Reply)
Discussion started by: alex90
1 Replies
UNAFS(8) System Manager's Manual UNAFS(8)
NAME
unafs - script to warn users about their weak passwords
SYNOPSIS
unafs password-files cell-name
DESCRIPTION
This manual page documents briefly the unafs command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The unafs tool gets password hashes out of the binary AFS database, and produces a file usable by John.
SEE ALSO
john(8), mailer(8), unique(8), unshadow(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 UNAFS(8)