Sponsored Content
Operating Systems Solaris Password Encryption (SunOS 5.8) Post 302212631 by de049 on Tuesday 8th of July 2008 03:54:16 AM
Old 07-08-2008
Password Encryption (SunOS 5.8)

Hi all,

I have a server in the office that we connect to via telnet. Can anyone explain please how i can encrypt the password so it cannot be picked up in plain text by sniffing software like WireShark, etc.?

I'm not very experienced in Unix, so any ideas or even links would be great.

Appreciate the assistance.

de049
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Zipping with password or encryption

We currently take files (via FTP) off of a mainframe and save them as a text file on our server. This is done via a script. The next thing that is done to that text file is it gets zipped (using ZIP). This all works fine, but it doesn't appear that ZIP (the free version) has any way to password... (2 Replies)
Discussion started by: dsimpg1
2 Replies

2. Programming

User name and password encryption

Hi, I have usernames and passwords (to connect oracle DB) buried in so many shell scripts. We want to externalize all usernames and passwords from those shell scripts and encrypt them and keep them in a file. So far I found two choices, 1) Use some encryption algorithms like (RC5/MD5) to... (5 Replies)
Discussion started by: satguyz
5 Replies

3. Solaris

Password encryption in script

:DHi i am preparing a script to connect to oracle from solaris.... now i want that no one is able to see the password in the script. is it possible...please help Regards Ankurk (3 Replies)
Discussion started by: ankurk
3 Replies

4. UNIX for Dummies Questions & Answers

Password encryption

In unix, i know the password encrypt by using salt But how does it work? And how windows protect its password? Thank you for helping in advance (5 Replies)
Discussion started by: cryogen
5 Replies

5. UNIX for Advanced & Expert Users

DES3 encryption in SunOS sparc

Hi, I want to encrypt a unix file using the des3 algorithm. Seems that there are no standard unix utilities readily available. Can you please suggest how I can encrypt a unix file using des3 ? (2 Replies)
Discussion started by: samuel.vincent
2 Replies

6. Shell Programming and Scripting

Password encryption...

Hi, I have a Java app that looks for some parameters in a .properties file such as username and password. However I don't want to leave the password in a text file and I can't modify the app... Does anyone have some idea about how to encrypt/hide/etc the password so it's not freely accessible... (1 Reply)
Discussion started by: Tr0cken
1 Replies

7. Shell Programming and Scripting

Password Encryption for Oracle Script

Please let me know the how to hide Oracle credential in below script: PP.AIX.ETL:/XYZ/abc/dsclientprod/home/scripts/monthly > cat exec_sql.sh set +x # import our environment #. /xyz/abc/dsclientprod/home/my.env ScriptOutput=/QIS2FTP/HP_ST_UAT/dsclientprod/home/scripts/ScriptRunInfo.txt... (2 Replies)
Discussion started by: rajubollas
2 Replies

8. UNIX for Dummies Questions & Answers

Password encryption

if I change my password on two different servers, using the same string but the encrypted password in /etc/passwd look different. If I copy an entry from one /etc/password to the other server. I can still log in to both servers using the same password. Only now both /etc/passwd entries are... (2 Replies)
Discussion started by: C0ppert0p
2 Replies

9. Shell Programming and Scripting

Password encryption in RHEL

I am working on a script where we are using sqlplus command to connect to Oracle DB. But the schemaname and password used for sqlplus authentication, have to be hardcoded in the script. DBconnection=scott/tiger@SID sqlplus $DBconnection Here any user who reads the script can read the... (1 Reply)
Discussion started by: max29583
1 Replies

10. Shell Programming and Scripting

DB Password encryption in config file

Hi Gurus, I need to encrypt the Db passwords which are stored in a configuration file (.txt) as below: stage_db_pwd=ABC this is test line content_db_pwd=123def This is test line 2 stg_db_name=xyz I want to encrypt all the password fields (identified by "pwd"), encrypt them in the same... (3 Replies)
Discussion started by: ashishpanchal85
3 Replies
CREATEUSER(1)						  PostgreSQL Client Applications					     CREATEUSER(1)

NAME
createuser - define a new PostgreSQL user account SYNOPSIS
createuser [ options... ] [ username ] DESCRIPTION
createuser creates a new PostgreSQL user. Only superusers (users with usesuper set in the pg_shadow table) can create new PostgreSQL users, so createuser must be invoked by someone who can connect as a PostgreSQL superuser. Being a superuser also implies the ability to bypass access permission checks within the database, so superuserdom should not be granted lightly. createuser is a shell script wrapper around the SQL command CREATE USER [create_user(7)] via the PostgreSQL interactive terminal psql(1). Thus, there is nothing special about creating users via this or other methods. This means that the psql application must be found by the script and that a database server must be running at the targeted host. Also, any default settings and environment variables used by psql and the libpq front-end library will apply. OPTIONS
createuser accepts the following command-line arguments: username Specifies the name of the PostgreSQL user to be created. This name must be unique among all PostgreSQL users. -a --adduser The new user is allowed to create other users. (Note: Actually, this makes the new user a superuser. The option is poorly named.) -A --no-adduser The new user is not allowed to create other users (i.e., the new user is a regular user, not a superuser). -d --createdb The new user is allowed to create databases. -D --no-createdb The new user is not allowed to create databases. -e --echo Echo the queries that createuser generates and sends to the server. -E --encrypted Encrypts the user's password stored in the database. If not specified, the default is used. -i uid --sysid uid Allows you to pick a non-default user ID for the new user. This is not necessary, but some people like it. -N --unencrypted Does not encrypt the user's password stored in the database. If not specified, the default is used. -P --pwprompt If given, createuser will issue a prompt for the password of the new user. This is not necessary if you do not plan on using pass- word authentication. -q --quiet Do not display a response. You will be prompted for a name and other missing information if it is not specified on the command line. createuser also accepts the following command-line arguments for connection parameters: -h host --host host Specifies the host name of the machine on which the server is running. If host begins with a slash, it is used as the directory for the Unix domain socket. -p port --port port Specifies the Internet TCP/IP port or local Unix domain socket file extension on which the server is listening for connections. -U username --username username User name to connect as (not the user name to create) -W --password Force password prompt (to connect to the server, not for the password of the new user). ENVIRONMENT
PGHOST PGPORT PGUSER Default connection parameters DIAGNOSTICS
CREATE USER All is well. createuser: creation of user "username" failed Something went wrong. The user was not created. If there is an error condition, the backend error message will be displayed. See CREATE USER [create_user(7)] and psql(1) for possibili- ties. EXAMPLES
To create a user joe on the default database server: $ createuser joe Is the new user allowed to create databases? (y/n) n Shall the new user be allowed to create more new users? (y/n) n CREATE USER To create the same user joe using the server on host eden, port 5000, avoiding the prompts and taking a look at the underlying query: $ createuser -p 5000 -h eden -D -A -e joe CREATE USER "joe" NOCREATEDB NOCREATEUSER CREATE USER SEE ALSO
dropuser(1), CREATE USER [create_user(7)] Application 2002-11-22 CREATEUSER(1)
All times are GMT -4. The time now is 01:26 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy