08-15-2008
I wrote you should also take another UID than the one from the line you copied^^ Best would be one that isn't taken already.
It welcomes you as user "someuser" because the 1st entry it finds is the one with "someuser" having also the uid 30313.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
On my small network some of my users are having trouble logging in. What's something that I can do to find out what's wrong? Are there any commands that I can run or files I can check?
,AP (4 Replies)
Discussion started by: Anthony
4 Replies
2. UNIX for Dummies Questions & Answers
hello,
Actually I want to create a user for our brower based custom application for the mail access from our mailserver(linux).
I create user dummy and I granted all the privileages to dummy user and made dummy equivelent to root and if I tried to create a another user logging as dummy ... (1 Reply)
Discussion started by: jarkvarma
1 Replies
3. HP-UX
hello:
before I am add user in Linux with " adduser" command .
for example system(adduser zzf -p hello);
and this command "-p" option is used to create "login password".
now i do not find the "-p" option in " adduser " in hp unix os.
and i should how to do ??? (3 Replies)
Discussion started by: phoenix_fei
3 Replies
4. Linux
Hi All
I am facing a login issue actually on my local machine users are not suppose to login with there respective prompt on the machine.
Access deneid
login as: daya
Sent username "daya"
daya@10.10.0.3's password:
Access denied
daya@192.168.0.83's password:
and even i am not suppose... (3 Replies)
Discussion started by: daya.pandit
3 Replies
5. AIX
1) when user login to the server the session got colosed. How will resolve?
2) While firing the command ls -l we are not able to see the any files in the director. but over all view the file system using the command df -g it is showing 91% used. what will be the problem?
Thanks in advance. (1 Reply)
Discussion started by: pernasivam
1 Replies
6. Red Hat
first of all I am Newbie to linux I confidured my sendmail -8.13 on RHEL5, but i have a problem regarding user accounts.
How can I user access his account on remotely while all users exit on servers ?
should i need to configure extra server to enable this ....
And what is LDAP and can this... (1 Reply)
Discussion started by: sandy6573
1 Replies
7. UNIX for Advanced & Expert Users
Dear All,
Plz help
in unixware 7x only root user login & other user not login .
message giving permission denied (3 Replies)
Discussion started by: sudhir69
3 Replies
8. AIX
Hi,
I am getting tired in creating several users in a day. Can anyone have a script to create several users in the same server, as well as, to create one user in several servers.
where i have to put script and how to run the script.
Waiting for your reply.
Thanks in advance (5 Replies)
Discussion started by: udtyuvaraj
5 Replies
9. UNIX for Advanced & Expert Users
I wan to add a new user. I have executed the following command. The user home directory is created.
but password creation shows error.
Note: I'm using LDAP Server for user authentication.
adduser xxx
Adding user `xxx' ...
Adding new group `xxx' (1003) ...
Adding new user `xxx' (1003) with... (2 Replies)
Discussion started by: ungalnanban
2 Replies
10. Red Hat
I could not create the user name with the number infront of...
useradd 8siva
useradd: Invalid account name `8siva' (3 Replies)
Discussion started by: gsiva
3 Replies
LEARN ABOUT DEBIAN
bup-margin
bup-margin(1) General Commands Manual bup-margin(1)
NAME
bup-margin - figure out your deduplication safety margin
SYNOPSIS
bup margin [options...]
DESCRIPTION
bup margin iterates through all objects in your bup repository, calculating the largest number of prefix bits shared between any two
entries. This number, n, identifies the longest subset of SHA-1 you could use and still encounter a collision between your object ids.
For example, one system that was tested had a collection of 11 million objects (70 GB), and bup margin returned 45. That means a 46-bit
hash would be sufficient to avoid all collisions among that set of objects; each object in that repository could be uniquely identified by
its first 46 bits.
The number of bits needed seems to increase by about 1 or 2 for every doubling of the number of objects. Since SHA-1 hashes have 160 bits,
that leaves 115 bits of margin. Of course, because SHA-1 hashes are essentially random, it's theoretically possible to use many more bits
with far fewer objects.
If you're paranoid about the possibility of SHA-1 collisions, you can monitor your repository by running bup margin occasionally to see if
you're getting dangerously close to 160 bits.
OPTIONS
--predict
Guess the offset into each index file where a particular object will appear, and report the maximum deviation of the correct answer
from the guess. This is potentially useful for tuning an interpolation search algorithm.
--ignore-midx
don't use .midx files, use only .idx files. This is only really useful when used with --predict.
EXAMPLE
$ bup margin
Reading indexes: 100.00% (1612581/1612581), done.
40
40 matching prefix bits
1.94 bits per doubling
120 bits (61.86 doublings) remaining
4.19338e+18 times larger is possible
Everyone on earth could have 625878182 data sets
like yours, all in one repository, and we would
expect 1 object collision.
$ bup margin --predict
PackIdxList: using 1 index.
Reading indexes: 100.00% (1612581/1612581), done.
915 of 1612581 (0.057%)
SEE ALSO
bup-midx(1), bup-save(1)
BUP
Part of the bup(1) suite.
AUTHORS
Avery Pennarun <apenwarr@gmail.com>.
Bup unknown- bup-margin(1)