07-01-2008
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Got the answer as it can be done using yast tool in SUSE linux (0 Replies)
Discussion started by: jambesh
0 Replies
2. UNIX for Dummies Questions & Answers
You guys tell me. Am I wrong on this one? If so, where is the hole in my thoughts?
Thanks,
Duke
Specs:
Solaris version of Unix
"ROOT" primary group is "other" (GID = 1)
Application account (not system account) is assigned to the "other" GID (1).
Issue:
Application... (3 Replies)
Discussion started by: F150 Duke
3 Replies
3. UNIX for Dummies Questions & Answers
I am an administrator of a Red Hat Enterprise Linux system.
Now one account expired. I wonder how to reactivate the account.
Thanks (2 Replies)
Discussion started by: cy163
2 Replies
4. UNIX and Linux Applications
Hi,
Can anyone please guide me how can I remove/block a user from a server access.
/usr/sbin/adduser -d /home/john john
echo ****** | passwd --stdin john
I used the above command to add a user "john". How do I delete and block john.
Appreciate your responses.... (2 Replies)
Discussion started by: sureshcisco
2 Replies
5. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (3 Replies)
Discussion started by: avklinux
3 Replies
6. Red Hat
How can I use the command "startx" by other user account such as "oracle" ??
I cannot startx by user account oracle ??
How to fix it ???
Any adivce ???
I use red hat linux kernel 2.6
$ startx
Fatal server error:
PAM authentication failed, cannot start X server.
Perhaps you do... (0 Replies)
Discussion started by: chuikingman
0 Replies
7. Red Hat
Hi,
I have to move user account from solaris to Linux environment because I don't want user to create password again in Linux environment, so could somebody confirm me how to do it, I know there are files /etc/groups, /etc/passwd and /etc/shadows need to copy but somebody confirm me what is the... (2 Replies)
Discussion started by: mnaumanca
2 Replies
8. Shell Programming and Scripting
good evening .. I have a plea, who I can help me with a management application user rights on the files in a Unix / Linux
I need for college .. .. and not told us no clue .. thank you (1 Reply)
Discussion started by: alex90
1 Replies
LEARN ABOUT DEBIAN
mailer
MAILER(8) System Manager's Manual MAILER(8)
NAME
mailer - script to warn users about their weak passwords
SYNOPSIS
mailer password-files
DESCRIPTION
This manual page documents briefly the mailer command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The mailer tool is useful to inform users which have been found to be using weak passwords by mail.
You should edit the message mailer will send to the users, but remember to copy the script to a safe place before editing it, as it's gen-
erally a bad idea to modify things living in /usr.
SEE ALSO
john(8), unafs(8), unique(8), unshadow(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 MAILER(8)