11-28-2010
It is not difficult to set up an account for children and use a bit of software to only permit access to "parental approved" web sites. I have a friend who did this and it worked well and was easy to set up. They simply created a restricted account on their computer that did not permit any software to be installed period (prevents the malicious code concern). and they installed some software (forgot the name, not expensive) that only permitted web access to approved sites. Of course, they could have set it up otherwise, and had a blacklist instead of a whitelist; but they wanted to be very restrictive.
This is easy to set up even with minimal computer skills.
This User Gave Thanks to Neo For This Post:
10 More Discussions You Might Find Interesting
1. Programming
Iam writing a script for my sisters friends little brother
i want the program to say hello lets say his name is Joe and ask him how he is and he can write a reply back saying fine and then it replys "Iam happy you are (his response) today
and then it goes into a basic math where he can put in a... (9 Replies)
Discussion started by: perleo
9 Replies
2. Programming
Hi,
I want to fork a new process from a daemon that needs terminal attachment to some ttyN or pts/N device. Here is the code
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <string.h>
int main(int... (5 Replies)
Discussion started by: ku@ntum
5 Replies
3. Programming
Hi,
I am calling a program that greps and returns 72536 bytes of data on STDOUT, say about 7000 lines of data on STDOUT.
I use pipe from the program am calling the above program. Naturally, I execute the above program (through execl() ) throught the child process and try to read the... (4 Replies)
Discussion started by: vvaidyan
4 Replies
4. Shell Programming and Scripting
I have two shell scripts : A.sh and B.sh
A.sh
echo "In A"
exec B.sh
echo "After B"
B.sh
echo "In B"
The output is : In A
In B
I want the output : In A
In B
After B (4 Replies)
Discussion started by: suchismitasuchi
4 Replies
5. Programming
Hello. This shouldn't be an unusual problem, but I cannot find anything about it at google or at other search machine.
So, I've made an application using C++ and QtCreator. I 've made a new mime type for application's project files.
My system (ubuntu 10.10), when I right click a file and I... (3 Replies)
Discussion started by: hakermania
3 Replies
6. Homework & Coursework Questions
1. The problem statement, all variables and given/known data:
I need to make an program that in a loop creates one parent and five children with fork(). The problem i'm trying to solve is how to delete the parent and child of the childīs process.
2. Relevant commands, code, scripts,... (0 Replies)
Discussion started by: WhiteFace
0 Replies
7. Shell Programming and Scripting
Hi everyone
i am very new to linux , working on bash shell.
I am trying to solve the given problem
1. Create a process and then create children using fork
2. Check the Status of the application for successful running.
3. Kill all the process(threads) except parent and first child... (2 Replies)
Discussion started by: vizz_k
2 Replies
8. UNIX and Linux Applications
Dear all,
i am in last year of electronics department in engineering faculty
i need suggestions for a graduation project based on unix or free bsd or linux and electronics "embedded linux "
i think about embedded unix for example or device drivers
please i need helps (1 Reply)
Discussion started by: MOHA-1
1 Replies
9. Shell Programming and Scripting
Hi All,
My program flow is as below
Windows batch -- > Cygwin batch --> zsh script
There are multiple Cygwin batch scripts that are called from Windows batch file . But when i am executing the first cygwin batch script the control goes to the zsh file and executes and stoping from... (1 Reply)
Discussion started by: Hypesslearner
1 Replies
10. Shell Programming and Scripting
Hello,
I have been given a scripting project, but have not learned any scripting. I need to get some ideas on how to start. Attached is part of the project:
I have no idea how to parse the arguments. What I had in mind was to get the arguments ($1, $2, ... ) and have if statements for different... (1 Reply)
Discussion started by: facepalm
1 Replies
CHPASS(1) General Commands Manual CHPASS(1)
NAME
chpass - add or change user database information
SYNOPSIS
chpass [ -a list ] [ user ]
DESCRIPTION
Chpass allows editing of the user database information associated with user or, by default, the current user. The information is formatted
and supplied to an editor for changes. The vi editor will be used unless the environmental variable EDITOR selects an alternate editor.
When the editor terminates, the information is re-read and used to update the user database itself. Only the user, or the super-user, may
edit the information associated with the user.
Only the information that the user is allowed to change is displayed.
Possible display items are as follows:
Login: user's login name
Password: user's encrypted password
Uid: user's id
Gid: user's login group id
Change: password change time
Expire: account expiration time
Class: user's general classification
Home Directory: user's home directory
Shell: user's login shell
Full Name: user's real name
Location: user's normal location
Home Phone: user's home phone
Office Phone: user's office phone
The login field is the user name used to access the computer account.
The password field contains the encrypted form of the user's password.
The uid field is the number associated with the login field. Both of these fields should be unique across the system (and often across a
group of systems) as they control file access.
While it is possible to have multiple entries with identical login names and/or identical user id's, it is usually a mistake to do so.
Routines that manipulate these files will often return only one of the multiple entries, and that one by random selection.
The group field is the group that the user will be placed in upon login. Since this system supports multiple groups (see groups(1)) this
field currently has little special meaning. This field may be filled in with either a number or a group name (see group(5)).
The change field is the date by which the password must be changed.
The expire field is the date on which the account expires.
Both the change and expire fields should be entered in the form ``month day year'' where month is the month name (the first three charac-
ters are sufficient), day is the day of the month, and year is the year.
The class field is currently unused. In the near future it will be a key to a termcap(5) style database of user attributes.
The user's home directory is the full UNIX path name where the user will be placed on login.
The shell field is the command interpreter the user prefers. If the shell field is empty, the Bourne shell (/bin/sh) is assumed.
When altering a login shell, and not the super-user, the user must select an approved shell from the list in /etc/shells.
The last four fields are for storing the user's full name, office location, and home and work telephone numbers.
The super-user is also allowed to directly supply a user database entry, in the format specified by passwd(5), as an argument to the -a
option. This argument must be a colon (``:'') separated list of all the user database fields, although they may be empty.
Once the information has been verified, chpass uses mkpasswd(8) to update the user database. This is run in the background, and, at very
large sites could take several minutes. Until this update is completed, the password file is unavailable for other updates and the new
information will not be available to programs.
FILES
/etc/master.passwd The user database /etc/shells The list of approved shells
SEE ALSO
login(1), finger(1), getusershell(3), passwd(5), mkpasswd(8), vipw(8)
Robert Morris and Ken Thompson, UNIX password security
BUGS
User information should (and eventually will) be stored elsewhere.
4th Berkeley Distribution March 12, 1989 CHPASS(1)