Sponsored Content
Full Discussion: Password Attribute
Operating Systems Linux Red Hat Password Attribute Post 302323951 by mark54g on Tuesday 9th of June 2009 12:07:41 PM
Old 06-09-2009
/etc/login.defs
 

10 More Discussions You Might Find Interesting

1. Linux

File attribute Help please

Could anyone help i have a question that i have a problem with for my home work it is, How do i change file permissions in a command line enviromet thanx (1 Reply)
Discussion started by: Cube3k
1 Replies

2. Programming

UNIX->C++ File attribute

Hi to all, I need in Microsoft C++ to IDENTIFY unix files which are LINKS. I use CFTPFILEFIND class. Thanks :-) .:rolleyes: (0 Replies)
Discussion started by: mizrachi
0 Replies

3. Shell Programming and Scripting

Dynamic Attribute Changes

Hello , I am stuck out in a part of my script, though I am trying it through a script of loops but i emphasis on having a short code : Input file has Attribute values changing with time Date Monday October 30 10:22:56 IST 2006 object values references Date ... (8 Replies)
Discussion started by: er_aparna
8 Replies

4. Solaris

Changa attribute command.

Hi all , plz tell the equivalent command of chattr ( linux ) in solaris? (4 Replies)
Discussion started by: saurabh84g
4 Replies

5. Linux

Unable to get terminal attribute!

Hi, I'm using scli (Command line utility) to retrieve the information about qlogic HBA and I want to redirect the information to text file. * While execution I'm getting the following warning "Unable to get terminal attribute!" How to avoid that ? because of this "Unable to get terminal... (3 Replies)
Discussion started by: shausy
3 Replies

6. Solaris

Solaris Attribute Problems

When I modify the file attributes of files and run a ls -l to view the changes everything looks correct, however when I run the init 6 to reboot the server the file attributes devert back to the origininal read only permissions. Any help would be appreciated (2 Replies)
Discussion started by: jimcz2it
2 Replies

7. UNIX for Dummies Questions & Answers

How to use xml_grep to get the value of an attribute?

I'm using xml_grep command to get the value of different tags in a xml-file. No i also need the value of an attribute in a tag. Can I use xml_grep for this? Does anybody know how? ex. : <Name xmlns:xsi="http://www.w3.org/2001/XMLinst" xsi:spaceSchema="Name_5879.xsd"> ... </Name> I... (1 Reply)
Discussion started by: pistach
1 Replies

8. Red Hat

(.) at the end of file attribute.

Hi Linux Experts, I am using RHEL 6.4, on checking I identified some files ends with the file attribute like dot (.) at the end. Whereas, I checked with the same level of other servers and I don't identify dot(.) at the end of file attribute. Why is it so? is there any meaning for it. ... (3 Replies)
Discussion started by: gsiva
3 Replies

9. Shell Programming and Scripting

How to change a PS attribute?

Hi, i want to list all system processes showing the attributes pid, user name, cpu consumption, and the difference between the resident memory and the swap memory needed to stock the process in case of suspending it. i have two questions, the resident memory is the attribute size i think,... (4 Replies)
Discussion started by: Eskizoide
4 Replies

10. Forum Support Area for Unregistered Users & Account Problems

Password sent via reset password email is 'weak' and won't allow me to change my password

I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login. Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
SECURETTY(5)						     Linux Programmer's Manual						      SECURETTY(5)

NAME
securetty - file which lists terminals from which root can log in DESCRIPTION
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmis- sion of certain authentication tokens. It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the shadow suite. On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are accepted. FILES
/etc/securetty SEE ALSO
login(1), login.defs(5), pam_securetty(8) COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. Linux 2015-03-29 SECURETTY(5)
All times are GMT -4. The time now is 10:53 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy