09-01-2010
Hi
I think it's not possible to recover the old password you also don't have the back up a/c . Why don't you try your security questions?
Calvin
Last edited by pludi; 09-01-2010 at 02:21 AM..
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I got myself a dec 5100 running ultrix with unknow password, how do i recover or change the root password on it? (10 Replies)
Discussion started by: cybermike
10 Replies
2. UNIX for Dummies Questions & Answers
We recently terminated a developer at my place of employment who created scripts on a windows server (that i do not have access to) that invoke FTP sessions on my UnixWare 7.1.1 servers.
I need to know the password that is being used. Does anyone know of a good password crack? (8 Replies)
Discussion started by: rm -r *
8 Replies
3. Shell Programming and Scripting
hi,all
my database (.db) is created by sysbase adaptive server anywhere7.0 ! the user id is DBA. but I lost the password . Could you recovery the passwrod of this db file?
thanks !
iwind (1 Reply)
Discussion started by: northwind
1 Replies
4. UNIX for Dummies Questions & Answers
Hi, I am new to unix and I set a password for a user and now I need to recover what that password was. Is there a way, where as root, I can view what a users passwords is?
Thanks,
Eric (2 Replies)
Discussion started by: ejbrever
2 Replies
5. Forum Support Area for Unregistered Users & Account Problems
hello,
my password got lost - and your service to generate new passwords does not work -ive tried it out 50 times the last week or so, never got a single mail from it...
please generate a new password for my account "congo" with mailadress.
thanks.
Thomas (3 Replies)
Discussion started by: congo00000001
3 Replies
6. UNIX for Dummies Questions & Answers
Hello board,
I'm new to Solaris Linux world, trying to learn on my onw, as I notice the windows is a big fraud....
OK let me get to my issue:
I have a SOlaris 8 X86 that I don;t have a password and even the screen is disabled(assuming for the security reasons) I just see a... (8 Replies)
Discussion started by: nexOne
8 Replies
7. Solaris
Is it possible to reset a normal user password , by editing password field in /etc/shadow file?
Thanks (6 Replies)
Discussion started by: ksvaisakh
6 Replies
8. Cybersecurity
Perderabo has made posted a good thread in the FAQ section here: Lost root password / Can't login as root | Unix Linux Forums | Answers to Frequently Asked Questions (6 Replies)
Discussion started by: norsk hedensk
6 Replies
9. Shell Programming and Scripting
Hi all,
I'm a complete newbie to bash scripting, although I have some experience in programming. The thing is that I have a .dmg file on my mac which I protected with a password, and now I've forgotten it.
I remember the first few letters of the password and the characters that represent the... (4 Replies)
Discussion started by: sujay.jauhar
4 Replies
10. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Hi guys. My case study is about creating a script that includes password recovery whenever a user forgets... (1 Reply)
Discussion started by: jenimesh19
1 Replies
LEARN ABOUT SUSE
pam_pwcheck
pam_pwcheck(8) Reference Manual pam_pwcheck(8)
NAME
pam_pwcheck - PAM module for password strength checking
DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the
change itself. It only provides functionality for one PAM management group: password changing.
This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack
likes the password, the module does an additional set of strength checks. These checks are:
Palindrome
Is the new password a palindrome of the old one?
Case Change Only
Is the new password the old one with only a change of case?
Similar
Is the new password too similar to old one?
Simple Is the new password too short?
Rotated
Is the new password a rotated version of the old password?
Already used
Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd.
OPTIONS
The following options may be passed to the module:
cracklib=<path to dictionaries>
Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is
/usr/lib/cracklib_dict.
debug A lot of debug information is printed with syslog(3).
maxlen=number
Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0.
minlen=number
The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero
suppresses this check. The default is 5.
no_obscure_checks
No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage
is recommended.
not_set_pass
If this option is given, pam_pwcheck will not make the new password available for other modules.
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the
user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process.
tries=number
Maximum number of attempts to change a password if the new ones are rejected because they are too easy.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask
the user for the new password.
use_first_pass
By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked
for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is
available.
remember=XX
Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number
between 1 and 400.
enforce_for_root
If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what
you are doing, since it could be as result that root is no longer allowed to login at all.
FILES
/etc/security/opasswd
SEE ALSO
passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)
pam_pwcheck September 2008 pam_pwcheck(8)