Sponsored Content
Full Discussion: User id modification
Operating Systems Solaris User id modification Post 302485335 by jegaraman on Tuesday 4th of January 2011 11:48:13 PM
Old 01-05-2011
Hi All

Thanks for all ur replies.

Rgds
Rj
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

How to find out who did the modification

Hi guys, In the UNIX work environment we have access other peoples directory and sometimes we have full access to other people's files. How can we find out , other than modification time that WHO did modification on any file ? I know we can change the access of any file by chmod but... (0 Replies)
Discussion started by: nick27
0 Replies

2. UNIX for Advanced & Expert Users

URGENT: Password modification for oracle user

Hi to all, Need help! For user sysoper on oracle, I want to know who and on which date/time the password has been modified? The platform is unix itself. Thanks (2 Replies)
Discussion started by: ashvik
2 Replies

3. UNIX for Advanced & Expert Users

Modification in configuration file to disable a particular user

Please anyone can tell me what is the procedure to perform the required modifications in configuration files to disable a particular user??? (3 Replies)
Discussion started by: debjyotidas007
3 Replies

4. Shell Programming and Scripting

Restrict modification of a file while it is already in use by another user?

How to restrict modification of a file while it is already in use by another user? If a file is in use by one user account, how to restrict it so that no one else can change it until its closed by the first user? (3 Replies)
Discussion started by: bdiwakarteja
3 Replies

5. UNIX for Dummies Questions & Answers

Last modification date without 'ls'

Hi, I'm executing a script to check if a file has been modified on a shared folder. I use this to start another script every time the file has been modified. To do this I use the 'ls' command to get the last modification date of the file. My problem is that the computer hosting the shared... (5 Replies)
Discussion started by: Peuj
5 Replies

6. Shell Programming and Scripting

Awk modification

I need help modifying the code below. DATAFILE is a log file. I have two strings i need to search for in the log file. The two strings are: 1. ERROR 2. com.rolander.promotions.client awk 'BEGIN { while((getline < "'${SFILE}'")>0) S FS="\n"; RS="\n" } (11 Replies)
Discussion started by: SkySmart
11 Replies

7. Shell Programming and Scripting

help in modification of code

I have below code, i want to run this code, but this below code should run on myblocka myblockb myblockcc myblockxx myblockanything but it will not run on "myblock" for BLOCK in /sys/block/myblock* do echo "100000" > "$BLOCK"/abcd done (7 Replies)
Discussion started by: learnbash
7 Replies

8. Web Development

Tapatalk Modification for vB3 - Adding User for System Information

Referring back to this thread: Tapatalk Modification for vB3 - Issue with Avatar Icons I mentioned that we had some "system bot" code: In this post, I describe that code and how easy it is to create a "system bot" user for Tapatalk (TT): Basically, its quite easy. We add a hook to... (0 Replies)
Discussion started by: Neo
0 Replies

9. Shell Programming and Scripting

How to do user-preset login to Bash shell then automate path modification?

How do a user login with full user-environment preset to Bash shell then automatically do path modification with few script codes, either on command-line or put it in a script file. what i tried: bash --login -c PATH="/ANewPath:${PATH}" bash --login -c 'PATH="/ANewPath:${PATH}"; export PATH'... (2 Replies)
Discussion started by: abdulbadii
2 Replies

10. UNIX for Beginners Questions & Answers

cp modification

I'm usia Raspbian, a Debian subset, and wondering what work would be involved in altering the cp command. cp at present needs a full path and file name for source and at least full filename for destination. How can I change this so the second parameter isn't needed? So if the destination... (6 Replies)
Discussion started by: MuntyScrunt
6 Replies
DNSSPOOF(8)						      System Manager's Manual						       DNSSPOOF(8)

NAME
dnsspoof - forge replies to DNS address / pointer queries SYNOPSIS
dnsspoof [-i interface] [-f hostsfile] [expression] DESCRIPTION
dnsspoof forges replies to arbitrary DNS address / pointer queries on the LAN. This is useful in bypassing hostname-based access controls, or in implementing a variety of man-in-the-middle attacks. OPTIONS
-i interface Specify the interface to use. -f hostsfile Specify the pathname of a file in hosts(5) format. Only one hostname allowed per line (no aliases), although hostnames may contain wildcards (such as *.doubleclick.net). expression Specify a tcpdump(8) filter expression to select traffic to sniff. If no hostsfile is specified, replies will be forged for all address queries on the LAN with an answer of the local machine's IP address. FILES
/usr/share/dsniff/dnsspoof.hosts Sample hosts file. SEE ALSO
dsniff(8), hosts(5) AUTHOR
Dug Song <dugsong@monkey.org> DNSSPOOF(8)
All times are GMT -4. The time now is 08:58 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy