Sponsored Content
Full Discussion: User id modification
Operating Systems Solaris User id modification Post 302485335 by jegaraman on Tuesday 4th of January 2011 11:48:13 PM
Old 01-05-2011
Hi All

Thanks for all ur replies.

Rgds
Rj
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

How to find out who did the modification

Hi guys, In the UNIX work environment we have access other peoples directory and sometimes we have full access to other people's files. How can we find out , other than modification time that WHO did modification on any file ? I know we can change the access of any file by chmod but... (0 Replies)
Discussion started by: nick27
0 Replies

2. UNIX for Advanced & Expert Users

URGENT: Password modification for oracle user

Hi to all, Need help! For user sysoper on oracle, I want to know who and on which date/time the password has been modified? The platform is unix itself. Thanks (2 Replies)
Discussion started by: ashvik
2 Replies

3. UNIX for Advanced & Expert Users

Modification in configuration file to disable a particular user

Please anyone can tell me what is the procedure to perform the required modifications in configuration files to disable a particular user??? (3 Replies)
Discussion started by: debjyotidas007
3 Replies

4. Shell Programming and Scripting

Restrict modification of a file while it is already in use by another user?

How to restrict modification of a file while it is already in use by another user? If a file is in use by one user account, how to restrict it so that no one else can change it until its closed by the first user? (3 Replies)
Discussion started by: bdiwakarteja
3 Replies

5. UNIX for Dummies Questions & Answers

Last modification date without 'ls'

Hi, I'm executing a script to check if a file has been modified on a shared folder. I use this to start another script every time the file has been modified. To do this I use the 'ls' command to get the last modification date of the file. My problem is that the computer hosting the shared... (5 Replies)
Discussion started by: Peuj
5 Replies

6. Shell Programming and Scripting

Awk modification

I need help modifying the code below. DATAFILE is a log file. I have two strings i need to search for in the log file. The two strings are: 1. ERROR 2. com.rolander.promotions.client awk 'BEGIN { while((getline < "'${SFILE}'")>0) S FS="\n"; RS="\n" } (11 Replies)
Discussion started by: SkySmart
11 Replies

7. Shell Programming and Scripting

help in modification of code

I have below code, i want to run this code, but this below code should run on myblocka myblockb myblockcc myblockxx myblockanything but it will not run on "myblock" for BLOCK in /sys/block/myblock* do echo "100000" > "$BLOCK"/abcd done (7 Replies)
Discussion started by: learnbash
7 Replies

8. Web Development

Tapatalk Modification for vB3 - Adding User for System Information

Referring back to this thread: Tapatalk Modification for vB3 - Issue with Avatar Icons I mentioned that we had some "system bot" code: In this post, I describe that code and how easy it is to create a "system bot" user for Tapatalk (TT): Basically, its quite easy. We add a hook to... (0 Replies)
Discussion started by: Neo
0 Replies

9. Shell Programming and Scripting

How to do user-preset login to Bash shell then automate path modification?

How do a user login with full user-environment preset to Bash shell then automatically do path modification with few script codes, either on command-line or put it in a script file. what i tried: bash --login -c PATH="/ANewPath:${PATH}" bash --login -c 'PATH="/ANewPath:${PATH}"; export PATH'... (2 Replies)
Discussion started by: abdulbadii
2 Replies

10. UNIX for Beginners Questions & Answers

cp modification

I'm usia Raspbian, a Debian subset, and wondering what work would be involved in altering the cp command. cp at present needs a full path and file name for source and at least full filename for destination. How can I change this so the second parameter isn't needed? So if the destination... (6 Replies)
Discussion started by: MuntyScrunt
6 Replies
ident2(8)						      System Manager's Manual							 ident2(8)

NAME
ident2 - An advanced ident daemon SYNOPSIS
ident2 [options] DESCRIPTION
ident2 is an advanced ident daemon, which can run as an inetd service or on it's own. It has various features such as user defined and ran- dom replies, extensive logging, and full administrative control. OPTIONS
The program follows the usual GNU syntax command-line unless it is unsupported on your system. GNU options begin with two dashes(`-') and have much more descriptive names. -h, --help Show summary of options. -u, --usage Shows example command lines -v, --version Show version information -l, --license Show licensing information -a, --force-inetd Force inetd mode, if autodetection isn't working. -d, --force-daemon Force standalone daemon, if autodetection isn't working. -i, --use-user-ident Allow user defined ident replies. Just do a echo 'ident ar' > ~/.ident to change your ident reply. -y, --user-reply-file File ident2 should look for in user's homedir for replies. Default is ~/.ident -n, --allow-noident-file Disable replies for user if user has a ~/.noident file. This behavior is disabled by default. -o, --client-timeout Clients timeout after this many seconds -s, --dont-change-uid Ident2 will normally try to change it's uid to something less privileged if it finds it's uid to be 0. This option disables this behavior altogether. -r, --always-random Always send a random reply, regardless of what kind of request the client made. This is useful for abusing the ident protocol as well as assisting outgoing IP masqueraded connections. -m, --daemon-maxclients Daemon-only: Accept no more than this many connections at a time. -p, --daemon-port Daemon-only: Bind this port, instead of 'auth' aka 113 SEE ALSO inetd(8), inetd.conf(5) AUTHOR
This manual page was written by Alexander Reelsen <ar@rhwd.net>, for the Debian GNU/Linux system (but may be used by others). GNU ident2(8)
All times are GMT -4. The time now is 12:17 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy