09-29-2012
I don't think I want to help you try to write a script like this, but here are a few issues to consider if you really want to pursue this project:
- What constitutes "was working upon during logg (sic) off"? (Open in an editor? If so, do you have a list of editors to be used for this purpose?)
- What encryption/decryption tools do you plan to use that don't need user interaction to enter an encryption/decription key?
- How do you plan to determine that a file is a text file? (File extension of ".txt", file utility contains "text" in the output it produces when processing the file as an operand, ...?)
- How do you plan to keep from corrupting files if a user is logged in twice and logs out of one session while continuing to process files in another login session?
- Do you have any plan on a way to recover from a power failure that occurs while some users are logged in (or even worse; while one or more users were in the process of logging in or out)?
- If a sysadmin is editing a system configuration file when being logged out (such as /etc/passwd or /etc/group) and you encrypt those files as that user logs out, no one will be able to login after that until those files are restored. If any users edit files shared with other people working on a common project, you will have destroyed the ability to share files.
Good luck,
Don
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello guys !
I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course.
Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan.
But when... (3 Replies)
Discussion started by: abidmalik
3 Replies
2. Programming
Dear all,
If anyone has some ideas for me how to tackle the following situation:
Imagine a type of client-server application. The client application is started by a human operator with all the necessary LDAP/Kerberos in place. The server application is started automatically as a daemon process.... (2 Replies)
Discussion started by: domivv
2 Replies
3. Solaris
Hi
Someone is going to send me a file that they have encrypted by PGP encryption on windows pc to my solaris 9 server.
They will give me the pgp key to decrypt the file.
How can I do this on solaris 9
Is there a tool installed by default to decrypt or do I need to install something to... (0 Replies)
Discussion started by: frustrated1
0 Replies
4. Solaris
hi,
is there any library functions available in sun solaries for encryption and decryption functions.
regards
suresh (1 Reply)
Discussion started by: suresh_rtp
1 Replies
5. UNIX for Dummies Questions & Answers
Dear Members,
Can we find if a particular file is encrypted or decrypted.
I need a command by which i should be able to identify if a file is encrypted or decrypted.
How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies
6. Shell Programming and Scripting
How can view log messages between two time frame from /var/log/message or any type of log files.
when logfiles are very big and especially many messages with in few minutes, I would like to display log messages between 5 minute interval.
Could you pls give me the command? (1 Reply)
Discussion started by: johnveslin
1 Replies
7. Shell Programming and Scripting
Hello All,
There are so many questions on this and I didn't find any concluded answer.
I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember.
I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies
8. Ubuntu
we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in
this is to be made by chging source code of linux ...........
can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies
9. Shell Programming and Scripting
Redirecting log files to null writing junk into log files.
i have log files which created from below command
exec <processname> >$logfile
but when it reaches some size i am redirecting to null while process is running like
>$logfile
manually but after that it writes some junk into... (7 Replies)
Discussion started by: greenworld123
7 Replies
10. Shell Programming and Scripting
Hi Friends,
There are some 7 years script in out linux server. I am trying to understand them since Linux Server changed(A).
Below line in one of the encrypting script. Here scenario is encrypting bank files in our (A) server and doing Secure Copy to Server (B).
GPG -v --batch --yes --armor... (1 Reply)
Discussion started by: johnsnow
1 Replies
LEARN ABOUT ULTRIX
finger
finger(1) General Commands Manual finger(1)
Name
finger - print user finger information
Syntax
finger [options] [name...]
Description
By default, lists the login name, full name, terminal name and write status, idle time, login time, and office location and phone number
for each current ULTRIX user. Terminal write status is noted as an asterisk (*) before the terminal name if write permission is denied.
Idle time is given in minutes if the listing shows a single integer, hours and minutes if a colon (:) is present, or days and hours if a d
is present.
A longer format also exists and is used by whenever a list of people's names is given. (Account names as well as first and last names of
users are accepted.) This format is multi-line, and includes all the information described above as well as the user's home directory and
login shell. Additionally, it displays the information contained in the files .plan and .project, both of which are located in the user's
home directory. If no list is given, all the people currently logged in are shown.
The command may be used to look up users on a remote machine. The format is to specify the user as user@host. If the user name is left
off, the standard format listing is provided on the remote machine.
Options
-b Displays a briefer long form list of users.
-f Disables printing of headers for short and quick outputs.
-h Suppresses printing of the .project file.
-i Displays list of users with idle times.
-l Displays output in long format.
-m Matches arguments only on user name.
-p Suppresses printing of the .plan file.
-q Displays list of users.
-s Displays output in short format.
-w Displays narrow short format of specified users.
Restrictions
Only the first line of the .project file is printed.
The user's or file cannot be a link to another file. If either of these files is something other than a regular file, it will be ignored.
Files
Who file
User information
Last login times
Plans
Projects
See Also
chfn(1), w(1), who(1), fingerd(8c)
finger(1)