02-10-2011
Ya, we are trying to mount usb flash drive for the user which runs on LTSP server. What happens is that, sometimes if the UID is changed for the user he cannot access his pen drive so if we delete it from the /tmp and add a line of his UID in /etc/mtab, it starts working. So there is no harm to delete from the /tmp
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
there is a directory eg. /home/edp/ , all the files under this directory :
1. the file and directory owner is "user1" ,
2. the permission is 644
I want everyone hv permission to overwrite all files and write a new file to it , but I want the file owner and permssion keep unchange , could... (1 Reply)
Discussion started by: ust
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
We are facing problem to delete some logfiles. Explaing with example for clear understanding :
we have 2 accounts : prdpqrs (application account) & prodxyz (admin account - not root). Both of them are in same group called 'release'
While prodxyz is trying to remove a file owned by... (4 Replies)
Discussion started by: sabyasm
4 Replies
3. UNIX for Advanced & Expert Users
User - sysopr need to convert the output file from Oracle UTL_FILE_DIR using dos2unix command.
However, the file owner and the group is belongs to oracle with dba group as follows:
-rw-r--r-- 1 oradw dba 22049864 May 23 15:37 transmission*.csv
What are the possible methods to... (2 Replies)
Discussion started by: KhawHL
2 Replies
4. UNIX for Dummies Questions & Answers
All,
I am running a script , which has permision as below
-r-xr-x--- 1 pmgr ffw 11660 Sep 3 2003 ccln
and tring to delete the file in the directory inter
(sys212:pct:/>) ll | grep ^d
dr-xr-xr-x 32 bin bin 8192 Dec 24 03:24 etc
drwxr-xr-x 32... (2 Replies)
Discussion started by: arunkumar_mca
2 Replies
5. Cybersecurity
Hello,
i need some help/advice on how to solve a particular problem.
these are the users:
|name | group |
---------- ---------------
|boss | department1 |
|assistant | department1 |
|employee | department1 |
|spy | department2 |
this is the... (0 Replies)
Discussion started by: elzalem
0 Replies
6. UNIX for Dummies Questions & Answers
i have two user named sourav and jishu.
i have created a file named source.txt in sourav.
i made another user called shovon.
i want to give read write permission of souce.txt for shovon but not for jishu.
how can i set permission only for jishu ? (1 Reply)
Discussion started by: sourav_ray
1 Replies
7. Post Here to Contact Site Administrators and Moderators
i think we should also have the permissions to delete our own thread (3 Replies)
Discussion started by: tarunicon
3 Replies
8. Solaris
Hi,
I have a directory /u01/source.
Following are current permission on directory source.
oracle@TEST # ls -l source
drwxrwxrwx 2 user1 userbi 31232 Apr 8 13:33 EG1
drwxrwxrwx 2 user1 userbi 1024 Apr 8 05:45 E2
drwxrwxrwx 2 user1 userbi 57344 Mar 15 10:22 h5
There is another ... (4 Replies)
Discussion started by: fahdmirza
4 Replies
9. Red Hat
ENVIROMENT
Linux: Fedora Core release 1 (Yarrow)
iPlanet: iPlanet-WebServer-Enterprise/6.0SP1
Log Path: /usr/iplanet/servers/https-company/logs
I have iPlanet log rotation enabled rotating files on a daily basis.
The rotated logs are NOT compressed & are taking up too much space.
I... (7 Replies)
Discussion started by: zachs
7 Replies
10. Shell Programming and Scripting
Hello all,
I have a problem with rsync command.
From a backup server, I use a command like the one below:
rsync -av --delete user@host:/home/user/ /home/backup_user/daily_rotating_backup/
In some folders of the user there are some files on which he has removed his write permission on... (3 Replies)
Discussion started by: freddie50
3 Replies
LEARN ABOUT DEBIAN
pam_rootok
PAM_ROOTOK(8) Linux-PAM Manual PAM_ROOTOK(8)
NAME
pam_rootok - Gain only root access
SYNOPSIS
pam_rootok.so [debug]
DESCRIPTION
pam_rootok is a PAM module that authenticates the user if their UID is 0. Applications that are created setuid-root generally retain the
UID of the user but run with the authority of an enhanced effective-UID. It is the real UID that is checked.
OPTIONS
debug
Print debug information.
MODULE TYPES PROVIDED
The auth, acct and password module types are provided.
RETURN VALUES
PAM_SUCCESS
The UID is 0.
PAM_AUTH_ERR
The UID is not 0.
EXAMPLES
In the case of the su(1) application the historical usage is to permit the superuser to adopt the identity of a lesser user without the use
of a password. To obtain this behavior with PAM the following pair of lines are needed for the corresponding entry in the /etc/pam.d/su
configuration file:
# su authentication. Root is granted access by default.
auth sufficient pam_rootok.so
auth required pam_unix.so
SEE ALSO
su(1), pam.conf(5), pam.d(5), pam(7)
AUTHOR
pam_rootok was written by Andrew G. Morgan, <morgan@kernel.org>.
Linux-PAM Manual 06/04/2011 PAM_ROOTOK(8)