11-03-2012
its same as CHMOD ? or like chown
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies
2. Programming
Hi,
Could any one help me to write a C program for password mask
with ******. I mean whatever word i will type that will show on the screen as ***** and should store the correct value in a variable.
Thanks in advance
Krishna (5 Replies)
Discussion started by: krishna
5 Replies
3. IP Networking
What is the command to change the mask to 255.255.255.0
The system was set up incorectly and the mask needs to be corrected (1 Reply)
Discussion started by: kkinnon
1 Replies
4. Shell Programming and Scripting
HP-UX 11i v2. #!/bin/sh
Hi all.
I have a flat file like this with lines like this:
|07/19/07|08:26AM|1|CupsCoffee|CupsCo|989898989 |Doe, John Y |THE PLUS CARD - Price| | |Y| | 2.00|
I would like to replace the id number (field 6) with a masked... (3 Replies)
Discussion started by: lyoncc
3 Replies
5. Web Development
Hi All
I have a web server,I have many world writeable directories (0777),Created by programmers,for uploading pictures.
Now i want to stop script excuation (php,cgi,etc) in the directories 0777,I know one way is to use htaccess file,i dont wana used that,if some one know any other method... (14 Replies)
Discussion started by: aliahsan81
14 Replies
6. Shell Programming and Scripting
I have an requirement. There is a file which has the below contents
Unix|123|17-01-2010
....
....
....
....
and so an
now each letter has a corresponding predefined mapping letter in order to mask the original data.(for example U = A,
n=b, i=c, x=d, same like number 1=9,2=8,3=7. Also... (8 Replies)
Discussion started by: ksmbabu
8 Replies
7. UNIX for Dummies Questions & Answers
Hi All,
i am executing peoplesoft sqr command from unix prompt which has the unix id/password as parameter along with other parameters. i want to show whole command in log file but want to mask the id/password field. this command i am executing in shell script. Please suggest..
>sqr sqrname... (2 Replies)
Discussion started by: avi.coep
2 Replies
8. Solaris
Hi All, I've been trying to configure samba on Solaris 10 to allow me to have one share that is open and writable to all users and have the rest of my shares password protected by a generic account.
If I set my security to user, my secured shares work just fine and prompt accordingly, but when... (0 Replies)
Discussion started by: ideal2545
0 Replies
9. Red Hat
Hi Experts,
I'm using samba -3.6.1 on Red Hat Enterprise Linux ES release 4 (Nahant Update 8) ,all seems ok. The issue im facing is as follows.
When ever a user creates a file via windows explorer the permissions assgined to the file are as follows
-rw-rwxr--+ 1 tom group2 0 Mar 9... (1 Reply)
Discussion started by: maverick_here
1 Replies
10. UNIX for Dummies Questions & Answers
Hi Guys,
can someone explain what is mask and effective right mask in setfacl and
getfacl command with example, unable to get it. (3 Replies)
Discussion started by: Jcpratap
3 Replies
LEARN ABOUT OPENSOLARIS
chown
chown(1B) SunOS/BSD Compatibility Package Commands chown(1B)
NAME
chown - change owner
SYNOPSIS
/usr/ucb/chown [-fR] owner[.group] filename...
DESCRIPTION
chown changes the owner of the filenames to owner. The owner can be either a decimal user ID (UID) or a login name found in the password
file. An optional group can also be specified. The group can be either a decimal group ID (GID) or a group name found in the GID file.
In the default case, only the super-user of the machine where the file is physically located can change the owner. The system configura-
tion option {_POSIX_CHOWN_RESTRICTED} and the privileges PRIV_FILE_CHOWN and PRIV_FILE_CHOWN_SELF also affect who can change the ownership
of a file. See chown(2) and privileges(5).
OPTIONS
The following options are supported:
-f Do not report errors.
-R Recursively descend into directories setting the ownership of all files in each directory encountered. When symbolic links are
encountered, their ownership is changed, but they are not traversed.
USAGE
See largefile(5) for the description of the behavior of chown when encountering files greater than or equal to 2 Gbyte ( 2^31 bytes).
FILES
/etc/passwd Password file
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWscpu |
+-----------------------------+-----------------------------+
SEE ALSO
chgrp(1), chown(2), group(4), passwd(4), attributes(5), largefile(5), privileges(5)
SunOS 5.11 21 Jun 2004 chown(1B)