11-09-2012
Hi Hergp,
Yes, exactly! I have $ in the password...
Is there any way to provide password with $ or not?
Anyhow, I can just change password, so problemis solved, but just interesting..
Huge thanks man,
you helped me a lot!!!
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
What does the isql command do for solaris 8????
Is this something that comes with solaris because I have it at work but not at home.
Plus does anyone know a good SQL site where I could learn all the sql commands
thankx (2 Replies)
Discussion started by: eloquent99
2 Replies
2. UNIX for Dummies Questions & Answers
can anyone pls explain me the command
$ isql -Usa -SIN63DS -Pgoalmal
1>load database STS_IN_PRD from "/STSDBBakup/ AEOD20030509"
2>go
thx (2 Replies)
Discussion started by: girish_shukla
2 Replies
3. Shell Programming and Scripting
Hello all...
i'm trying to execute a shell script through crontab.
To run at 8pm on wednesday's
The crontab entry:
00 20 * * 3 /u2/dir1/dir2/jobs/p.sh
the p.sh file:
isql -s claims /u2/dir1/dir3/dir4/a.sql
permissions for it are -rwxrwx--x
i've confirmed a.sql is in that directory.
... (2 Replies)
Discussion started by: mrviking
2 Replies
4. Shell Programming and Scripting
Hi,
We are using isql in our scripts to connect to sybase dataserver on Solaris
See the following snippet:
isql -U${USER} -S${SERVER} -w999 <<- EOB
${PASSWD}
use ${QS_DBNAME}
go
EOB
The above code works even if there are spaces before the ${PASSWORD}
But if we... (1 Reply)
Discussion started by: justsam
1 Replies
5. Shell Programming and Scripting
Hi,
Please help me to solve this problem on Unix isql. Following is an example table and expected select result. I need to select NAMEs where those NAMEs don't have a record which TYPE='T1'. I tried, but got both N2 and N3.
NAME TYPE DATA
---------------------
N1 T1 D11
N2... (0 Replies)
Discussion started by: momi
0 Replies
6. Shell Programming and Scripting
hi all
i m running following code
# set up environment
. /u/pimms/pimms_global.ksh
echo "Get record from database"
#echo ${PIMMS_ID}
#echo ${PIMMS_PWD}
#echo "1"
isql -U${PIMMD_ID} -P${PIMMS_PWD} -S$SRV << eof > /sybase/applications/pimms/bin/automate1.txt
use pimms
... (6 Replies)
Discussion started by: d_swapneel14
6 Replies
7. Shell Programming and Scripting
I have been given an SQL script I need to convert to ISQl. In the styatement it has the following line which is flagging an error:
Select stocknum as 'bipart'
this comes up with: 201: A syntax error has occurred
Does ISQL support the SELCT AS statement and if not is there a simple... (2 Replies)
Discussion started by: andydb70
2 Replies
8. Shell Programming and Scripting
Hi All,
I'm niks and i'm a newbie here and newbie in shell, i'm just wondering what is the meaning of -U -P -S in the sample script below.
"-U iccbs_dbo -P iccbsdbo -S CCB_REO"
Thanks, (2 Replies)
Discussion started by: nikki1200
2 Replies
9. Shell Programming and Scripting
I have searched the forums and other sites and cannot come with the applicable approach for what I am trying to do. I am trying to setup a cron job that executes this script. The script uses iSQL - which is connecting ok - to then query a field and then assign that field to a variable to do an If... (4 Replies)
Discussion started by: courtneyjh
4 Replies
10. Programming
Hello,
I am having sybase database want to use ISQL to extract some data. Can someone please provide the link from where i can download freeware ISQL. Also documents which i can read and know
1. How to get he list of tables.
2. How to check data inside the table.
3. How to make queries etc.... (1 Reply)
Discussion started by: rajjev_saini123
1 Replies
LEARN ABOUT DEBIAN
pam_pwcheck
pam_pwcheck(8) Reference Manual pam_pwcheck(8)
NAME
pam_pwcheck - PAM module for password strength checking
DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the
change itself. It only provides functionality for one PAM management group: password changing.
This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack
likes the password, the module does an additional set of strength checks. These checks are:
Palindrome
Is the new password a palindrome of the old one?
Case Change Only
Is the new password the old one with only a change of case?
Similar
Is the new password too similar to old one?
Simple Is the new password too short?
Rotated
Is the new password a rotated version of the old password?
Already used
Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd.
OPTIONS
The following options may be passed to the module:
cracklib=<path to dictionaries>
Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is
/usr/lib/cracklib_dict.
debug A lot of debug information is printed with syslog(3).
maxlen=number
Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0.
minlen=number
The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero
suppresses this check. The default is 5.
no_obscure_checks
No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage
is recommended.
not_set_pass
If this option is given, pam_pwcheck will not make the new password available for other modules.
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the
user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process.
tries=number
Maximum number of attempts to change a password if the new ones are rejected because they are too easy.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask
the user for the new password.
use_first_pass
By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked
for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is
available.
remember=XX
Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number
between 1 and 400.
enforce_for_root
If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what
you are doing, since it could be as result that root is no longer allowed to login at all.
FILES
/etc/security/opasswd
SEE ALSO
passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)
pam_pwcheck September 2008 pam_pwcheck(8)