06-24-2009
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All
How can I set password in linux.It is OK if it display password in plain text in script.
manually i can set:
#passwd
Changing password for root
Enter new password:
Bad password: too weak.
Re-enter new password:
Password changed.
#
I want this to be done by script.Please let me... (2 Replies)
Discussion started by: tannu
2 Replies
2. Shell Programming and Scripting
Hi Friends.
I am new to scripting now i want to change the root password using the script with standard password.
which is the easy scripting to learn for the beginner, Thanks in advance. (2 Replies)
Discussion started by: kurva
2 Replies
3. Shell Programming and Scripting
Hi,
I have written a shell script in unix for my customer. Now I want to make it only execute and not to read/write. Can anybody help me how to set password protect/encript my script.
Thanks
Suresh (3 Replies)
Discussion started by: suresh3566
3 Replies
4. Shell Programming and Scripting
okay here I go again...
I have created a script which adds new user to /etc/password and which inturn creating a locked password in /etc/shadow but I am expecting to have *NP* for that particular user.Can someone help me with a script which can set the password for a particular user to NP in... (1 Reply)
Discussion started by: sintilash
1 Replies
5. Shell Programming and Scripting
Hi Techies
I am stuck in a problem, I have written a script which is calling a second script which contains some command and password for quering on database. I do not want to disclose this command or specially password file. Please help..
Please have a look on directory structure and... (2 Replies)
Discussion started by: atul9806
2 Replies
6. Shell Programming and Scripting
Hi All,
I have a gateway server, from where I can connect any server via 'sudo ssh server_name'. Generally, if we need to run a command on any number of servers, we put server names in a file like '/tmp/ser_name' and execute it with for loop from gateway server.
Now, I need to set non-expiry... (0 Replies)
Discussion started by: solaris_1977
0 Replies
7. Shell Programming and Scripting
Hi,
I am unable to set the password remotely. I am using the script as below:
ep=`echo "$p" | /usr/lbin/makekey`
ssh -t $i "/usr/local/bin/sudo useradd -c "$user_c" -m -d /home/$user_id -s /bin/ksh $user_id; /usr/local/bin/sudo /usr/sam/lbin/usermod.sam -F -p $ep $user_id"
The... (0 Replies)
Discussion started by: Kits
0 Replies
8. Shell Programming and Scripting
Hi,
I am looking for a shell script which serves the below purpose.
Please find below the algorithm for the same and any help on this would be highly appreciated.
1)set of strings need to be replaced among set of files(directory may contain different types of files)
2)It should search for... (10 Replies)
Discussion started by: Amulya
10 Replies
9. Shell Programming and Scripting
Hi,
I have a requirement where in i need to write a shell script to set users password to never expire. I know the command which is used to perform the same .. which is chage command.
But, could not figure out how to do the same in shell script.
Could you please help me with the shell... (3 Replies)
Discussion started by: suren424
3 Replies
crypt(1) crypt(1)
NAME
crypt - encode or decode a file
SYNOPSIS
crypt [password]
The crypt utility encrypts and decrypts the contents of a file. crypt reads from the standard input and writes on the standard output. The
password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off
printing while the key is being typed in. crypt encrypts and decrypts with the same key:
example% crypt key < clear.file > encrypted.file
example% crypt key < encrypted.file | pr
prints the contents of clear.file.
Files encrypted by crypt are compatible with those treated by the editors ed(1), ex(1), and vi(1) in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space
must be infeasible; "sneak paths" by which keys or cleartext can become visible must be minimized.
crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on
such machines are widely known, thus crypt provides minimal security.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, that is, to take a substan-
tial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read
by expending only a substantial fraction of five minutes of machine time.
Since the key is an argument to the crypt command, it is potentially visible to users executing ps(1) or a derivative command. To minimize
this possibility, crypt takes care to destroy any record of the key immediately upon entry. No doubt the choice of keys and key security
are the most vulnerable aspect of crypt.
/dev/tty for typed key
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
des(1), ed(1), ex(1), ps(1), vi(1), attributes (5)
8 Mar 2005 crypt(1)