Sponsored Content
Operating Systems Solaris A strange user appears in my quotas and I can't find it in my system Post 302280797 by lzcool on Tuesday 27th of January 2009 02:57:03 PM
Old 01-27-2009
ok, Thanks man!!!
You've help me solve a problem that had my head spinning quite a lot!!!
It's weird, how can a user have dissapeared from /etc/passwd and still have his files growing in size...
I believe, a previous administrator must've tried to delete the user, but quite stupidly...
Thanks a lot man!!
as root I used the command
find / -user 883
and all files from that user appeared, so I could erase them.
Now I'll try to investigate, why was it still growing...
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

integer user names and user quotas!

hello, i want to implements user quotas. the problem is that all of our user names are integer numbers, like 8510453. so when i set quota for a user (e.g. 8510453), it wont be set for that user name instead it will be set for exactly this: #8510453 (this is what webmin report shows). i have... (5 Replies)
Discussion started by: mrhosseini
5 Replies

2. Shell Programming and Scripting

Find the user with less number of files in the system

Good morning everybody, I'm using Minix and I want to find the user with less number of files in the system I have tried this solution: #! /bin/sh indice=0 listaCut=$(cut -f 3 -d : /etc/passwd) for USER in $listaCut; do cont=0 listaFind=$(find / -user "${USER}" -type -f) ... (4 Replies)
Discussion started by: Guccio
4 Replies

3. Shell Programming and Scripting

Find user owner of the most recently file in the system

Good evening everybody, I have to find the user owner of the most recently file in the system How can I do? :confused: (5 Replies)
Discussion started by: Guccio
5 Replies

4. UNIX for Dummies Questions & Answers

how to find a word in a file that appears next to a given keyword

Hi Experts, I have a file which contains some text. i need to print the word next to a given keyword. Please help. Ex: test.txt ===================== NEXT HOST ===================== AEADBAS001 access-list 1 permit xxxxxxxxxxxxxx ip access-list extended BLA_Outgoing_Filter... (6 Replies)
Discussion started by: mwrg
6 Replies

5. Shell Programming and Scripting

find a user on the system

i am prompting for a name to search. read user if then however, i get this error: please enter a username on the system: fool menu_script2.sh: line 123: (4 Replies)
Discussion started by: icelated
4 Replies

6. UNIX for Dummies Questions & Answers

Strange system activity no matter what I try

When I choose to encrypt my drive during a Linux install, it encryps it, but I receive errors in dmesg and in ~/.xsessions-errors during use. The first error is in dmesg where it sometimes shows errors writing to the encypted device. The second error is in ~/.xsessions-errors with an error about... (0 Replies)
Discussion started by: justgoogleit
0 Replies

7. Solaris

quotas on two file system

Hi Guys, I have quota support turned on, on two file systems. However, when I do a repquota -va I get report only for one. What might be the problem? I will really appreciate your help. Thanks Gurus. (0 Replies)
Discussion started by: cjashu
0 Replies

8. Solaris

Strange space consumption on file-system

Hello, I have a x86 Solaris server running on VMWare. c1t0d0 is root disk of 40 GB. I am not able to find, where space is being consumed. It just available space is 2.6 GB only. There is no quota or reservation set. Can somebody give me some pointer to fix it ? -bash-3.2# zpool list NAME ... (6 Replies)
Discussion started by: solaris_1977
6 Replies

9. UNIX for Beginners Questions & Answers

Calling system() if certain text appears on the screen.

Hi. I'm wondering if it is possible to execute system(), if a certain string of text appears on the screen or not? I want to be able to run system("rz -Z") based on if "B00000000000000" appears on the screen. rz is a program to recieve files via Zmodem protocol. Is this possible? In C, of... (3 Replies)
Discussion started by: ignatius
3 Replies
PWCK(8) 						    System Management Commands							   PWCK(8)

NAME
pwck - verify integrity of password files SYNOPSIS
pwck [options] [passwd [ shadow ]] DESCRIPTION
The pwck command verifies the integrity of the users and authentication information. It checks that all entries in /etc/passwd and /etc/shadow have the proper format and contain valid data. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors. Checks are made to verify that each entry has: o the correct number of fields o a unique and valid user name o a valid user and group identifier o a valid primary group o a valid home directory o a valid login shell shadow checks are enabled when a second file parameter is specified or when /etc/shadow exists on the system. These checks are the following: o every passwd entry has a matching shadow entry, and every shadow entry has a matching passwd entry o passwords are specified in the shadowed file o shadow entries have the correct number of fields o shadow entries are unique in shadow o the last password changes are not in the future The checks for correct number of fields and unique user name are fatal. If the entry has the wrong number of fields, the user will be prompted to delete the entire line. If the user does not answer affirmatively, all further checks are bypassed. An entry with a duplicated user name is prompted for deletion, but the remaining checks will still be made. All other errors are warning and the user is encouraged to run the usermod command to correct the error. The commands which operate on the /etc/passwd file are not able to alter corrupted or duplicated entries. pwck should be used in those circumstances to remove the offending entry. OPTIONS
The -r and -s options cannot be combined. The options which apply to the pwck command are: -h, --help Display help message and exit. -q, --quiet Report errors only. The warnings which do not require any action from the user won't be displayed. -r, --read-only Execute the pwck command in read-only mode. -R, --root CHROOT_DIR Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory. -s, --sort Sort entries in /etc/passwd and /etc/shadow by UID. By default, pwck operates on the files /etc/passwd and /etc/shadow. The user may select alternate files with the passwd and shadow parameters. CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool: PASS_MAX_DAYS (number) The maximum number of days a password may be used. If the password is older than this, a password change will be forced. If not specified, -1 will be assumed (which disables the restriction). PASS_MIN_DAYS (number) The minimum number of days allowed between password changes. Any password changes attempted sooner than this will be rejected. If not specified, -1 will be assumed (which disables the restriction). PASS_WARN_AGE (number) The number of days warning given before a password expires. A zero means warning is given only upon the day of expiration, a negative value means no warning is given. If not specified, no warning will be provided. FILES
/etc/group Group account information. /etc/passwd User account information. /etc/shadow Secure user account information. EXIT VALUES
The pwck command exits with the following values: 0 success 1 invalid command syntax 2 one or more bad password entries 3 can't open password files 4 can't lock password files 5 can't update password files 6 can't sort password files SEE ALSO
group(5), grpck(8), passwd(5), shadow(5), usermod(8). shadow-utils 4.1.5.1 05/25/2012 PWCK(8)
All times are GMT -4. The time now is 10:57 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy