Hi, I'm new to linux and unix, and i have couple of problems:
1) how can i limit the access for a user, for example, i created a user, and i want that this user will be able to be only in one directory, and will see only the files i want him to.
2) I have a domain name, and i want that every... (4 Replies)
hey guys im rly new to unix. im attempting to list the 5 largest files in a directory.
so i got this far...
ls -lR | sort -r
and this lists all files by filesize, how can i limit this to only the 5 largest? (4 Replies)
I have tried limiting failed logins to three by the following method
logins -ox \ | awk -F: '($8 != "LK" && $1 != "root") { print $1 }' \ | while read logname; do
/usr/lbin/modprpw -m umaxlntr=3 "$logname"
done
/usr/lbin/modprdef -m umaxlntr=3
but it is failing on the 4th... any ideas?... (1 Reply)
if my user has to enter the name of months to carry out a search how can I limit the input values to only the month names and nothing else?
so far my input criteria for the user is this:
i would like it so the user can only enter the months in the way i have stated. otherwise they would... (11 Replies)
Hi,
I have searched the web and have come back with nothing that is satisfactory for what I require. SFTP is my corporations new file transfer standard. What I require is a method to lock down SFTP users to their directory (they may go to sub directories) while not restricting regular users. ... (2 Replies)
Hello,
Using a Solaris SunOS 5.10, is there anyway to limit the number of processors utilised by an external vendor application over the server, from the unix OS perspective? (1 Reply)
Hi there,
I have a Debian 5.0 server that my company uses for deployment testing. This server needs to be accessed by NOC people that have no NIX knowledge whatsoever.
I am creating a bash script for a menu-based command interface for the commands they need to run on their testing routines,... (21 Replies)
I'm looking for a way to limit connections to a Solaris 10 box from any single IP.
The problem is that I've had more experience doing this with IPTables on Linux, rather than with IPFilter, which I've found to be somewhat feature-poor.
I hope there is some way to do this using IPFilter, I've... (2 Replies)
Greetings.
I have script to monitor the disk space of folder it runs every 17 min with help of cron. It sends email when disk size reaches to 85 %. Now the issue is that it continousely generates email until we clear some space in that folder. Is it possible to restrict the Script to send only... (14 Replies)
Discussion started by: manju98458
14 Replies
LEARN ABOUT REDHAT
console.perms
console.perms(5) System Administrator's Manual console.perms(5)NAME
console.perms - permissions control file for users at the system console
DESCRIPTION
/etc/security/console.perms determines the permissions that will be given to priviledged users of the console at login time, and the per-
missions to which to revert when the users log out. It is read by the pam_console module.
The format is:
<class>=space-separated list of words
login-regexp|<login-class> perm dev-glob|<dev-class>
revert-mode revert-owner[.revert-group]
The revert-mode, revert-owner, and revert-group fields are optional, and default to 0600, root, and root, respectively.
The words in a class definition are evaluated as globs if they refer to files, but as regular expressions if they apply to a console defi-
nition. Do not mix them.
Any line can be broken and continued on the next line by using a character as the last character on the line.
The login-class class and the login-regexp word are evaluated as regular expressions. The dev-class and the dev-glob word are evaluated as
shell-style globs. If a name given corresponds to a directory, and if it is a mount point listed in /etc/fstab, the device node associated
with the filesystem mounted at that point will be substituted in its place.
Classes are denoted by being contained in < angle bracket > characters; a lack of < angle brackets > indicates that the string is to be
taken literally as a login-regexp or a dev-glob, depending on its input position.
SEE ALSO pam_console(8)pam_console_apply(8)console.apps(5)AUTHOR
Michael K. Johnson <johnsonm@redhat.com>
Red Hat Software 1999/2/3 console.perms(5)