03-26-2009
You have been posting this question in various forms since January.
Please do state what Operating System you have and whether it is described as a "secure" system.
Solutions to this problem are not necessarily portable.
You may wish to look at this clever use of shell redirect to handle the problem.
https://www.unix.com/shell-programmin...post40791.html
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
hello.
have please a demineur programmed in shell korn (unix).????
can you send it to me???
thanks. (0 Replies)
Discussion started by: raul
0 Replies
2. UNIX for Advanced & Expert Users
if you have the programme of Minesweeper;take me it because i need it.
thank u very much. (1 Reply)
Discussion started by: raul
1 Replies
3. Shell Programming and Scripting
Hi, being very new to Korn Shell Scripting I am hoping that someone here can help me. I want to compare file name in scp/inbox directory to file name stored inside a file in pnt/compare directory.
Hi, being very new to Korn Shell Scripting I am hoping that someone here can help me. I want to... (1 Reply)
Discussion started by: hanie123
1 Replies
4. UNIX for Dummies Questions & Answers
Hi
I'm new to scripting and I don't know where to start. I need to create a script that needs to look for specific files in a specific folder then I need to return the filename, the recordcount, bytecount and checksums. Then I need to write these results into a new file.
I would appreciate... (2 Replies)
Discussion started by: th0123
2 Replies
5. Shell Programming and Scripting
I have made the following simple script:
a=0
let a=$a+1
if "]
then mailx -s "Up" abc@yahoo.com
fi
When I run the above script, I get the following error:
# ./new.ksh
./new.ksh: ]: not found.
Please tell me how to use if here? (6 Replies)
Discussion started by: kamaldeep1986
6 Replies
6. Shell Programming and Scripting
I am attempting to learn shell programming using o'rielly book "Learning the Korn Shell".
I am finding it pretty difficult to do since the only access I have to unix boxes are running version 99 of ksh.
The book utilizes ksh93 and there appear to be many differences. I can't even follow along... (2 Replies)
Discussion started by: vedder191
2 Replies
7. UNIX for Advanced & Expert Users
I have a scenario to implement in Korn shell script. Here it is..
I need to compare two values to see whether they are same or not. The issue is that the values coming in for comparison can be a string or an integer which can be determined during run time only.
Which korn shell comparison... (2 Replies)
Discussion started by: vani123
2 Replies
8. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
There is a menu driven program and there are some fields to be achived
3. Display contents of all .lst files... (3 Replies)
Discussion started by: jainitai
3 Replies
9. Shell Programming and Scripting
Hi All,
Need urgent help with korn shell script, which monitors AIX WPARs Status. Basically WPARs run on a LPAR, So there is a Command "lswpar" which displays WPARs status. This script should be checking the WPARs Status and email support if WPAR is down or broken. General lswpar output is as... (3 Replies)
Discussion started by: aix_admin_007
3 Replies
10. Shell Programming and Scripting
#! /bin/ksh
while read line
do
if ] ; then
echo "no data"
continue;
fi
echo "performing operation on $line"
done < prg.txt (3 Replies)
Discussion started by: Juhi Kashyap
3 Replies
LEARN ABOUT REDHAT
shadow
SHADOW(5) File Formats Manual SHADOW(5)
NAME
shadow - encrypted password file
DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is
Login name
Encrypted password
Days since Jan 1, 1970 that password was last changed
Days before password may be changed
Days after which password must be changed
Days before password is to expire that user is warned
Days after password expires that account is disabled
Days since Jan 1, 1970 that account is disabled
A reserved field
The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 character alphabet a thru z, A thru
Z, 0 thru 9, . and /. Refer to crypt(3) for details on how this string is interpreted.
The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the
proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater
than the maximum number of day allowed, this password may not be changed by the user.
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass-
word expires. An account will also be disabled on the specified day regardless of other password expiration information.
This information supercedes any password or password age information present in /etc/passwd.
This file must not be readable by regular users if password security is to be maintained.
FILES
/etc/passwd - user account information
/etc/shadow - encrypted user passwords
SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8)
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
SHADOW(5)