02-11-2009
Yup, only the administrator would have that. check with your colleages if they have that. There's no way to recover, have to find for the password
4 More Discussions You Might Find Interesting
1. Solaris
Hello,
Wondering if anyone can help me with mounting a file share from my Sun T2000 server running Solaris 10 to my connected 2530 disk array?
I believe I've connected the disk array correctly and I have created a volume on the array using the filesystem (Sun_SAM-FS, RAID-5).
The T2000... (15 Replies)
Discussion started by: DundeeDancer
15 Replies
2. Solaris
Good Day,
We have bought Sun Sparc Enterprise T5120 with pre-installed Solaris 10 Sparc
But i need on this server Solaris 9. I have inserted in to DVD-rom (USB DVD-rom) with Solaris 9 for Sparc.
Then log into shell and type: reboot -- cdrom.
System rebooted and i have this message:
... (3 Replies)
Discussion started by: A.Shalin
3 Replies
3. Solaris
Newbie question.
I've been running OpenSolaris on an Intel box for some time with great success.
I have just bought an old Sun Blade workstation with a corrupted version of Solaris 5 something on it.
The plan was to install OpenSolaris on it.
However beyond my skills, I see, as no Live CD (or... (10 Replies)
Discussion started by: lewtargett
10 Replies
4. UNIX for Beginners Questions & Answers
-> start /SYS
Are you sure you want to start /SYS (y/n)? y
Starting /SYS
]-> show HOST
/HOST
Targets:
bootmode
diag
domain
Properties:
autorestart = reset
autorunonerror = false
bootfailrecovery = poweroff
... (29 Replies)
Discussion started by: z_haseeb
29 Replies
LEARN ABOUT DEBIAN
radcrypt
RADCRYPT(8) System Manager's Manual RADCRYPT(8)
NAME
radcrypt - generate password hash for use with radius, or validates a password hash
SYNOPSIS
radcrypt [-d|--des] [-m|--md5] [-c|--check] plaintext_password [hashed_password]
DESCRIPTION
radcrypt generates a hashed digest of a plaintext password, or can validate if a password hash matches a plaintext password. DES and MD5
hashes are currently supported. When generating a password hash a random salt is generated and applied.
A hashed password can be validated by specifying -c or --check and passing hashed_password after plaintext_password on the command line.
In this case hashed_password will be checked to see if it matches plaintext_password. If so "Password OK" will be printed and the exit sta-
tus will be 1, otherwise "Password BAD" will be printed and exit status will be 0 (Note this is the opposite of a normal successful shell
status).
OPTIONS
-d --des
Use a DES (Data Encryption Standard) hash (default). Ignored if performing a password check.
-m --md5
Use a MD5 (Message Digest 5) hash. Ignored if performing a password check.
-c --check
Perform a validation check on a password hash to verify if it matches the plantext password.
EXAMPLES
$ radcrypt foobar
HaX0xn7Qy650Q
$ radcrypt -c foobar HaX0xn7Qy650Q
Password OK
SEE ALSO
radiusd(8), crypt(3)
AUTHORS
Miquel van Smoorenburg <miquels@cistron-office.nl>
RADCRYPT(8)