If you don't provide the user-name, the default assumption is super user (root)
su => login as root
su someuser => login as someuser
a hyphen (-) is an option flag which tells whether the new users environment has to be exported or not. ( running .profiles, various environment settings for the target user)
Sir,
I using the following commands in a file (part of a bigger script):
#!/bin/bash
cd /opt/oracle/bin
ls -lt | tail -1 | awk '{print $6}' >> /tmp/ramb.out
If I run this from the command prompt the result is:
2007-05-16
if I run it as a cron job then... (5 Replies)
Hi ,
I have a piece of code ...wherein I need to assign the following ...
1) A command line argument to a variable
e.g origCount=ARGV
2) A unix command to a variable
e.g result=`wc -l testFile.txt`
in my awk shell script
When I do this :
print "origCount" origCount --> I get the... (0 Replies)
AIX:Command to get netaddress/subnet address command in IPv4/IP6
Can anybody help us with a command to retrieve netaddress/subnet address command in IPv4/IP6 on aix machine.
net/subnet address is in the format 172.16.212.0(signifies all 255 machines in an IPv4 network) (2 Replies)
Hi everyone,
when executing this command in unix:
echo "WM7 Fatal Alerts:", $(cat query1.txt) > a.csvIt works fine, but running this command in a shell script gives an error saying that there's a syntax error.
here is content of my script:
tdbsrvr$ vi hc.sh
"hc.sh" 22 lines, 509... (4 Replies)
Hi,
Well my title isn't very clear I think. So to understand my goal:
I have a script "test1"
#!/bin/bash
xvkbd -text blabla
with xbindkeys, I bind F5 key in order it runs my test1 script
So when I press F5, test1 runs.
I'm under Emacs/Vi and I press F5 in order to have "blabla" be... (0 Replies)
HI Guys,
I hope you are well. I am trying to write a script that gets executed every time i open a shell (cshell). I have two questions about that
1) I need to enter these commands
$ echo $DISPLAY
$ setenv $DISPLAY output_of_echo_$display_command
How can i write a... (2 Replies)
I am working with a sh script on a solaris 9 zone (sol 10 host) that grabs information to build the configuration command line. the variables Build64, SSLopt, CONFIGopt, and CC are populated in the script. the script includes
CC=`which gcc`
CONFIGopt=' --prefix=/ --exec-prefix=/usr... (8 Replies)
below is the output xml string from some other command and i will be parsing it using awk
cat /tmp/alerts.xml
<Alert id="10102" name="APP-DS-ds_ha-140018-componentFailure-S" alertDefinitionId="13982" resourceId="11427" ctime="1359453507621" fixed="false" reason="If Event/Log Level(ANY) and... (2 Replies)
exec(): 0509-036 Cannot load program /usr/opt/freeware/bin/rpm because of the following errors:
0509-022 Cannot load module /opt/freeware/lib/libintl.a(libintl.so.1).
0509-150 Dependent module /opt/freeware/lib/libiconv.a(shr4.o) could not be loaded.
0509-152 Member... (4 Replies)
Hello Forum,
I'm making very good progress on my report thanks to the very helpful people on this forum. I've been able to successfully create my report for my Red Hat servers. But I do have a few ubuntu servers in the mix and I'd like to capture some data from them when an ssh connection is... (8 Replies)
Discussion started by: greavette
8 Replies
LEARN ABOUT NETBSD
login
LOGIN(1) BSD General Commands Manual LOGIN(1)NAME
login -- authenticate users and set up their session environment
SYNOPSIS
login [-Ffps] [-a address] [-h hostname] [user]
DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system.
If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of
users is done via passwords. If the user can be authenticated via S/Key, then the S/Key challenge is incorporated in the password prompt.
The user then has the option of entering their Kerberos or normal password or the S/Key response. Neither will be echoed.
The options are as follows:
-a The -a option specifies the address of the host from which the connection was received. It is used by various daemons such as
telnetd(8). This option may only be used by the super-user.
-F The -F option acts like the -f option, but also indicates to login that it should attempt to rewrite an existing Kerberos 5 creden-
tials cache (specified by the KRB5CCNAME environment variable) after dropping permissions to the user logging in. This flag is not
supported under pam(8).
-f The -f option is used when a user name is specified to indicate that proper authentication has already been done and that no password
need be requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves.
-h The -h option specifies the host from which the connection was received. It is used by various daemons such as telnetd(8). This
option may only be used by the super-user.
-p By default, login discards any previous environment. The -p option disables this behavior.
-s Require a secure authentication mechanism like Kerberos or S/Key to be used. This flag is not supported under pam(8).
If a user other than the superuser attempts to login while the file /etc/nologin exists, login displays its contents to the user and exits.
This is used by shutdown(8) to prevent normal users from logging in when the system is about to go down.
Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of
the day as well as other information. If the file ``.hushlogin'' exists in the user's home directory, all of these messages are suppressed.
This is to simplify logins for non-human users. login then records an entry in the wtmp(5) and utmp(5) files, executes site-specific login
commands via the ttyaction(3) facility with an action of "login", and executes the user's command interpreter.
login enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter (SHELL),
search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER).
The user's login experience can be customized using login class capabilities as configured in /etc/login.conf and documented in
login.conf(5).
The standard shells, csh(1) and sh(1), do not fork before executing the login utility.
FILES
/etc/login.conf login class capability database
/etc/motd message-of-the-day
/etc/nologin disallows non-superuser logins
/var/run/utmp list of current logins
/var/log/lastlog last login account records
/var/log/wtmp login account records
/var/mail/user system mailboxes
.hushlogin makes login quieter
SEE ALSO chpass(1), newgrp(1), passwd(1), rlogin(1), skey(1), getpass(3), ttyaction(3), login.conf(5), passwd.conf(5), utmp(5), environ(7),
kerberos(8), pam(8)HISTORY
A login appeared in Version 6 AT&T UNIX.
TRADEMARKS AND PATENTS
S/Key is a trademark of Bellcore.
BSD November 19, 2008 BSD