03-12-2013
I am sure there are some behaviors for Trusted Mode after you log in, as some apps are not supported in int, but you mention things about login only.
My point is that by assigning a special shell to the account, you have an additional opportunity to apply access controls. I suppose that if stty processing is up before the shell, the tty might generate a signal, but the shell can handle that, and there is no other shell for it to break out to. The special shell can do additional authentication before exec*() of a normal shell or disconnect. It can even set a marker file for excess failed tries and lock the account.
7 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I just inst freeBSD boot installation and it didnt work for(probably my lack of knowledge) reasons but i now have to partitions in freeBSD and i really need them back for windows at the moment. i just cant find them. The bad thing is that i only got this bundled version of windows so i cant really... (2 Replies)
Discussion started by: riwa
2 Replies
2. AIX
have machine running AIX 4.3.3ML 11. It's rootvg has about 1GB of space available and is made up of 2 9GB drives. We are going to upgrade it to AIX 5.x but wanted more disk space for the upgrade. So was going to install 2 new 18GB drives. The plan was to bring the 2 18GB drives in as hdisk# and... (2 Replies)
Discussion started by: spattson
2 Replies
3. UNIX for Dummies Questions & Answers
Another question for you guys! This is so fun.
So I am playing around with the factor operation. I read in "man factor" that you can actually print a list of primes in between a range, using the syntax
factor ]
However, every time I enter two values, it just returns the factored value.... (1 Reply)
Discussion started by: statichazard
1 Replies
4. Shell Programming and Scripting
Hi,
I have a problem where I need to make this input:
nameRow1a,text1a,text2a,floatValue1a,FloatValue2a,...,floatValue140a
nameRow1b,text1b,text2b,floatValue1b,FloatValue2b,...,floatValue140b
look like this output:
nameRow1a,text1b,text2a,(floatValue1a - floatValue1b),(floatValue2a -... (4 Replies)
Discussion started by: nricardo
4 Replies
5. Shell Programming and Scripting
Hey guyz,
I have a table like this:
1 A=#;B=#;C=#
2 A=#;C=#;D=#;E=#;E=#
3 B=#;B=#;B=#;D=#
# are just some numbers. I want to have the output like this:
* 1 2 3
A # # NA
B # NA #
C # # NA
D NA # #
E NA # NA
So basically, I wanna know in each of the rows in my input (which... (9 Replies)
Discussion started by: @man
9 Replies
6. Shell Programming and Scripting
Hello all,
I have 2 text files.
For example:
File1.txt contains data
A
B
C
D
****NEXT****
X
Y
Z
****NEXT****
L
M
N
and File2.txt contains data (13 Replies)
Discussion started by: vat1kor
13 Replies
7. Cybersecurity
The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today's enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary... (1 Reply)
Discussion started by: reve-secure
1 Replies
CHSH(1) User Commands CHSH(1)
NAME
chsh - change login shell
SYNOPSIS
chsh [options] [LOGIN]
DESCRIPTION
The chsh command changes the user login shell. This determines the name of the user's initial login command. A normal user may only change
the login shell for her own account; the superuser may change the login shell for any account.
OPTIONS
The options which apply to the chsh command are:
-h, --help
Display help message and exit.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-s, --shell SHELL
The name of the user's new login shell. Setting this field to blank causes the system to select the default login shell.
If the -s option is not selected, chsh operates in an interactive fashion, prompting the user with the current login shell. Enter the new
value to change the shell, or leave the line blank to use the current one. The current shell is displayed between a pair of [ ] marks.
NOTE
The only restriction placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the superuser,
and then any value may be added. An account with a restricted login shell may not change her login shell. For this reason, placing /bin/rsh
in /etc/shells is discouraged since accidentally changing to a restricted shell would prevent the user from ever changing her login shell
back to its original value.
FILES
/etc/passwd
User account information.
/etc/shells
List of valid login shells.
/etc/login.defs
Shadow password suite configuration.
SEE ALSO
chfn(1), login.defs(5), passwd(5).
shadow-utils 4.5 01/25/2018 CHSH(1)