Sponsored Content
Operating Systems Solaris Problem using default account with ILOM on Sun SPARC Enterprise T5140 Post 302286493 by incredible on Wednesday 11th of February 2009 09:30:04 AM
Old 02-11-2009
Yup, only the administrator would have that. check with your colleages if they have that. There's no way to recover, have to find for the password
 

4 More Discussions You Might Find Interesting

1. Solaris

Accessing a StorageTek 2530 Disk array from SUN, SPARC Enterprise T2000

Hello, Wondering if anyone can help me with mounting a file share from my Sun T2000 server running Solaris 10 to my connected 2530 disk array? I believe I've connected the disk array correctly and I have created a volume on the array using the filesystem (Sun_SAM-FS, RAID-5). The T2000... (15 Replies)
Discussion started by: DundeeDancer
15 Replies

2. Solaris

Small issue with Sun Sparc Enterprise T5120

Good Day, We have bought Sun Sparc Enterprise T5120 with pre-installed Solaris 10 Sparc But i need on this server Solaris 9. I have inserted in to DVD-rom (USB DVD-rom) with Solaris 9 for Sparc. Then log into shell and type: reboot -- cdrom. System rebooted and i have this message: ... (3 Replies)
Discussion started by: A.Shalin
3 Replies

3. Solaris

Boot problem with SUN Sparc

Newbie question. I've been running OpenSolaris on an Intel box for some time with great success. I have just bought an old Sun Blade workstation with a corrupted version of Solaris 5 something on it. The plan was to install OpenSolaris on it. However beyond my skills, I see, as no Live CD (or... (10 Replies)
Discussion started by: lewtargett
10 Replies

4. UNIX for Beginners Questions & Answers

Start /SYS on SUN SPARC does not start machine [SUN SPARC ENTERPRISE T-5240]

-> start /SYS Are you sure you want to start /SYS (y/n)? y Starting /SYS ]-> show HOST /HOST Targets: bootmode diag domain Properties: autorestart = reset autorunonerror = false bootfailrecovery = poweroff ... (29 Replies)
Discussion started by: z_haseeb
29 Replies
RADCRYPT(8)						      System Manager's Manual						       RADCRYPT(8)

NAME
radcrypt - generate password hash for use with radius, or validates a password hash SYNOPSIS
radcrypt [-d|--des] [-m|--md5] [-c|--check] plaintext_password [hashed_password] DESCRIPTION
radcrypt generates a hashed digest of a plaintext password, or can validate if a password hash matches a plaintext password. DES and MD5 hashes are currently supported. When generating a password hash a random salt is generated and applied. A hashed password can be validated by specifying -c or --check and passing hashed_password after plaintext_password on the command line. In this case hashed_password will be checked to see if it matches plaintext_password. If so "Password OK" will be printed and the exit sta- tus will be 1, otherwise "Password BAD" will be printed and exit status will be 0 (Note this is the opposite of a normal successful shell status). OPTIONS
-d --des Use a DES (Data Encryption Standard) hash (default). Ignored if performing a password check. -m --md5 Use a MD5 (Message Digest 5) hash. Ignored if performing a password check. -c --check Perform a validation check on a password hash to verify if it matches the plantext password. EXAMPLES
$ radcrypt foobar HaX0xn7Qy650Q $ radcrypt -c foobar HaX0xn7Qy650Q Password OK SEE ALSO
radiusd(8), crypt(3) AUTHORS
Miquel van Smoorenburg <miquels@cistron-office.nl> RADCRYPT(8)
All times are GMT -4. The time now is 11:50 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy