05-11-2011
As i understand, restricted means that the user john from /export/home/john doesn't have access to this file(when i say access this means , doesn't have rights to execute, modify or read the file).
It is possible to be wrong related to the understanding of "restricted file". What do you think about...do you have other opinion about it?
regards,
catalin
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I want to know which profile will be called when a user without home directory is created.
When I created a user without home directory(by setting in /etc/default/useradd), the user is able to login directly into the main "/" folder but with only read permissions.
Thanks
naina (3 Replies)
Discussion started by: naina
3 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I am looking for a shell script (or any other way), that puts a user in a home directory jail. So for example, I have a user named richard and I don't want him wandering outside /usr/users/richard. I don't want him to cd to anywhere including cd ..
Somebody said you can do that with... (3 Replies)
Discussion started by: mz043
3 Replies
3. UNIX for Dummies Questions & Answers
I'm using HPUX 11i. The other day a user logon to the workstation and was not able to find the /home/directory (tom is the directory) I login myself and it is the same thing.
The home directory is on the server, so I was thinking of using sam to map it again. does anyone know how to do it... (5 Replies)
Discussion started by: blizzgamer
5 Replies
4. Solaris
How to find al the user's home directories? (2 Replies)
Discussion started by: a2156z
2 Replies
5. Solaris
Hi Guys,
I have a problem with configuring a server. this is a solaris 10 with sparc platform.
I have setup so that the server is Authenticating through NIS but I dont want the server to Mount the Home directories. The users need to logged in through the CDE/display.
I have over 200 users... (2 Replies)
Discussion started by: Luky
2 Replies
6. Solaris
# ls -l
total 10
-rw-r--r-- 1 dummy2 other 140 Jun 19 21:37 local.cshrc
-rw-r--r-- 1 dummy2 other 136 Jun 19 21:37 local.cshrc~
-rw-r--r-- 1 dummy2 other 157 Jun 19 21:37 local.login
-rw-r--r-- 1 dummy2 other 178 Jun 19 21:37 local.profile... (6 Replies)
Discussion started by: chidori
6 Replies
7. AIX
Hello,
I must close ssh users to the home directory.
It means the users musn't see anything inside their home directory.
For example after login to the os and type this command "cd .."
or "cd /" it musn't work.
How can I implement it?
(Probably chroot or rootsh but how?) (1 Reply)
Discussion started by: jeszi
1 Replies
8. Emergency UNIX and Linux Support
Hi all,
So I have created two Centos machines. One is configured as a NIS master and the second is a NIS cleint. The NIS configs are all working perfectly.
I created a user nisuser on NIS Master and I can use it on the client. BUT it doesnt show a home directory . Ive been told there is... (9 Replies)
Discussion started by: Junaid Subhani
9 Replies
9. UNIX for Advanced & Expert Users
Hi,
I have created a shared directory on /home, where all users on a certain group have read, write and execute permissions.
I did this using
chmod -R g+rwx /home/shared/
The problem is, when a particular user creates a directory within /home/shared, other users are not able to write to... (8 Replies)
Discussion started by: lost.identity
8 Replies
10. HP-UX
Hi
I need to set $HISTFILE for a user with no home directory. How to go about it because this user does not have a .profilefile. (5 Replies)
Discussion started by: fretagi
5 Replies
LEARN ABOUT DEBIAN
unshadow
UNSHADOW(8) System Manager's Manual UNSHADOW(8)
NAME
unshadow - combines passwd and shadow files
SYNOPSIS
unshadow password-file shadow-file
DESCRIPTION
This manual page documents briefly the unshadow command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The unshadow tool combines the passwd and shadow files so John can use them. You might need this since if you only used your shadow file,
the GECOS information wouldn't be used by the "single crack" mode, and also you wouldn't be able to use the '-shells' option. On a normal
system you'll need to run unshadow as root to be able to read the shadow file.
SEE ALSO
john(8), mailer(8), unafs(8), unique(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 UNSHADOW(8)