06-17-2010
You don't have to - just edit your shadow file (assuming you're using files for user accounts) to have something like "*NP*" in the password field.
That would prevent telnet access to the account, making the only way to get to the account would be via sudo (or su as root).
I'm not sure offhand if that would be secure enough, though. Maybe someone else could help with that.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi, we can set something such that if the user has been idle for a while, it will auto disconnect. where to do so? thanks (6 Replies)
Discussion started by: yls177
6 Replies
2. Shell Programming and Scripting
{
sleep 2
echo "$user"
sleep 2
echo "$password"
sleep 2
echo " ls"
sleep 10
echo "exit"
}| telnet $server
I have a machine x and i have executed the above script on machine 'x'.
i entered the... (6 Replies)
Discussion started by: pathanjalireddy
6 Replies
3. UNIX for Dummies Questions & Answers
Hi
Is there any way whilst in a telnet session you can view your client machine name that you are using to connect to the Unix box ? :eek: (2 Replies)
Discussion started by: mlucas
2 Replies
4. Solaris
how do i kill a user session (10 Replies)
Discussion started by: fsmadi
10 Replies
5. UNIX for Dummies Questions & Answers
Hello,
I have AIX 5.3 at home connected to netgear router. Port Forwarding has been enabled on the router. Problem is that if I want to telnet, I have to try 2 or 3 times before I can get a logon prompt. It times out for first or second time (Connection to session <IP_Address> failed: Connection... (1 Reply)
Discussion started by: bluebee
1 Replies
6. Shell Programming and Scripting
I am using Net::SSH::Expect to connect to the device(iLO) with SSH. After the $ssh->login() I'm able to view the prompt, but not able to send any coommands.
With the putty I can connect to the device and execute the commands without any issues.
Here is the sample script
my $ssh =... (0 Replies)
Discussion started by: hansini
0 Replies
7. HP-UX
Our network administrators implemented some sort of check to kill idle sessions and now burden is on us to run some sort of keep alive. Client based keep alive doesn't do a very good job. I have same issue with ssh. Does solution 2 provided above apply for ssh sessions also? (1 Reply)
Discussion started by: yoda9691
1 Replies
8. Shell Programming and Scripting
HI
I know that it sounds crazy :eek:
appreciated if any one provided me a solution for my below case , the below script is checking the Database availability on many servers by establishing rsh session ( one by one ) , sometime one of the servers goes down and while this the script taking... (0 Replies)
Discussion started by: bejo4ever
0 Replies
9. Solaris
Hi,
i need to kill the idle dt sessions through script, can anyone tell me how to do?
RJS (2 Replies)
Discussion started by: rajasekg
2 Replies
VIPW(8) System Management Commands VIPW(8)
NAME
vipw, vigr - edit the password, group, shadow-password or shadow-group file
SYNOPSIS
vipw [options]
vigr [options]
DESCRIPTION
The vipw and vigr commands edits the files /etc/passwd and /etc/group, respectively. With the -s flag, they will edit the shadow versions
of those files, /etc/shadow and /etc/gshadow, respectively. The programs will set the appropriate locks to prevent file corruption. When
looking for an editor, the programs will first try the environment variable $VISUAL, then the environment variable $EDITOR, and finally the
default editor, vi(1).
OPTIONS
The options which apply to the vipw and vigr commands are:
-g, --group
Edit group database.
-h, --help
Display help message and exit.
-p, --passwd
Edit passwd database.
-q, --quiet
Quiet mode.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-s, --shadow
Edit shadow or gshadow database.
ENVIRONMENT
VISUAL
Editor to be used.
EDITOR
Editor to be used if VISUAL is not set.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
/etc/passwd
User account information.
/etc/shadow
Secure user account information.
SEE ALSO
vi(1), group(5), gshadow(5) , passwd(5), , shadow(5).
shadow-utils 4.1.5.1 05/25/2012 VIPW(8)