11-03-2011
thanks
thanks for the quick replies and to clear it up I mean the good sense of the word hacker. not crackers who break system security. This project is for those that want to fine tune their unix skills.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi all,
what file(s) needs to be changed and in what way in order to do the following:
when user A logs onto freebsd 4.8 automaticaly he needs to start up a script a made that executes:
sets ltp0 in polling mode,
executes tn5250 keyboard mapping
starts tn5250 with the correct parameters.
... (2 Replies)
Discussion started by: termiEEE
2 Replies
2. UNIX for Dummies Questions & Answers
I run freebsd 4.8 and try to find the way or 'a' way to log in a certain user i created automaticaly at pc boot.
I have searched the net, the manuals, but found nothing...
could anyone please get me going by showing me an example or what file(s) i need to take a look at.
i am not working... (6 Replies)
Discussion started by: termiEEE
6 Replies
3. Shell Programming and Scripting
I need some help writing a script that I can run as a cron job. I want this script to be able find all the users that have logged on to this machine since the last time the script was run (plan to run daily at 11:30pm, so everyone who logged on that day) and email me who logged on, and when.
... (2 Replies)
Discussion started by: Drewser
2 Replies
4. Shell Programming and Scripting
I want to login to server using ssh or telnet and execute one command then exit to the shell
Please let me know how to write script for this? (1 Reply)
Discussion started by: svenkatareddy
1 Replies
5. Shell Programming and Scripting
Hi,
My requirement is that i am login from ROOT in a script but when any
command is coming which is logging to sqlplus then i have to run it with normal user as only normal user have permission to connect to sqlplus .
i tried making a script like this :
#! /bin/ksh
su -... (3 Replies)
Discussion started by: rawatds
3 Replies
6. Shell Programming and Scripting
Hi all,
I would need a script to run only at the first login of a newly created user. And at the first time only. I did some googlework but unfortunatly... I made up it possibly had something to do with the bashrc file.
This script is some kind of info for the user ; with the possiblity to... (1 Reply)
Discussion started by: laurens
1 Replies
7. UNIX for Dummies Questions & Answers
Hi guys,
I'm need to write a script that runs an infinite loop to check users that login/out of a server. I'm just not sure about the syntax with while loops and whether or not you can include a nested if-statement?
Cheers
Spaulds (2 Replies)
Discussion started by: Spaulds
2 Replies
8. Emergency UNIX and Linux Support
Hi there,
I have a Debian 5.0 server that my company uses for deployment testing. This server needs to be accessed by NOC people that have no NIX knowledge whatsoever.
I am creating a bash script for a menu-based command interface for the commands they need to run on their testing routines,... (21 Replies)
Discussion started by: ppucci
21 Replies
9. Shell Programming and Scripting
Hi Every body,
I would need a shell script program to login as different user and perform some copy commands in the script.
example: Supppose ora_toms is the active user
ora_toms should be able to run a script where user: ftptomsp pass: XXX should login through and run the commands
... (9 Replies)
Discussion started by: ujjwal27
9 Replies
10. Shell Programming and Scripting
now i have logged in username : ramesh in unix
Now i have to created script file to login into another user and have run a command inside that user and after executing the command i have to exit from that user.
Inside script, i have to login into su - ram along with password : haihow and have to... (4 Replies)
Discussion started by: rammm
4 Replies
LEARN ABOUT SUNOS
asetmasters
asetmasters(4) File Formats asetmasters(4)
NAME
asetmasters, tune.low, tune.med, tune.high, uid_aliases, cklist.low, cklist.med, cklist.high - ASET master files
SYNOPSIS
/usr/aset/masters/tune.low
/usr/aset/masters/tune.med
/usr/aset/masters/tune.high
/usr/aset/masters/uid_aliases
/usr/aset/masters/cklist.low
/usr/aset/masters/cklist.med
/usr/aset/masters/cklist.high
DESCRIPTION
The /usr/aset/masters directory contains several files used by the Automated Security Enhancement Tool (ASET). /usr/aset is the default
operating directory for ASET. An alternative working directory can be specified by the administrators through the aset -d command or the
ASETDIR environment variable. See aset(1M).
These files are provided by default to meet the need of most environments. The administrators, however, can edit these files to meet their
specific needs. The format and usage of these files are described below.
All the master files allow comments and blank lines to improve readability. Comment lines must start with a leading "#" character.
tune.low These files are used by the tune task (see aset(1M)) to restrict the permission settings for system objects. Each file is
tune.med used by ASET at the security level indicated by the suffix. Each entry in the files is of the form:
tune.high
pathname mode owner group type
where
pathname is the full pathname
mode is the permission setting
owner is the owner of the object
group is the group of the object
type is the type of the object It can be symlink for a symbolic link, directory for a directory, or file for
everything else.
Regular shell wildcard ("*", "?", ...) characters can be used in the pathname for multiple references. See sh(1). The mode
is a five-digit number that represents the permission setting. Note that this setting represents a least restrictive value.
If the current setting is already more restrictive than the specified value, ASET does not loosen the permission settings.
For example, if mode is 00777, the permission will not be changed, since it is always less restrictive than the current
setting.
Names must be used for owner and group instead of numeric ID's. ? can be used as a "don't care" character in place of
owner, group, and type to prevent ASET from changing the existing values of these parameters.
uid_alias This file allows user ID's to be shared by multiple user accounts. Normally, ASET discourages such sharing for accountabil-
ity reason and reports user ID's that are shared. The administrators can, however, define permissible sharing by adding
entries to the file. Each entry is of the form:
uid=alias1=alias2=alias3= ...
where
uid is the shared user id
alias? is the user accounts sharing the user ID
For example, if sync and daemon share the user ID 1, the corresponding entry is:
1=sync=daemon
cklist.low These files are used by the cklist task (see aset(1M)), and are created the first time the task is run at the low, medium,
cklist.med and high levels. When the cklist task is run, it compares the specified directory's contents with the appropriate
cklist.high cklist.level file and reports any discrepancies.
EXAMPLES
Example 1: Examples of Valid Entries for the tune.low, tune.med, and tune.high Files
The following is an example of valid entries for the tune.low, tune.med, and tune.high files:
/bin 00777 root staffsymlink
/etc 02755 root staffdirectory
/dev/sd* 00640 rootoperatorfile
SEE ALSO
aset(1M), asetenv(4)
ASET Administrator Manual
SunOS 5.10 13 Sep 1991 asetmasters(4)