Sponsored Content
Operating Systems SCO Some questions about UNIXware Post 302879300 by DGPickett on Wednesday 11th of December 2013 05:00:23 PM
Old 12-11-2013
History is shell-dependent, but usually goes into $HISTFILE = ~/.shell_hist or the like; see your shell's man page. You can zap the fille and start a new shell. Just removing one command or line is a bit more difficult. It sounds hacker-esque. History is great! Don't ever put passwords on the command line, generally. Put them in env vars, in piped streams, but not where ps can report them and $HISTFILE records them.

All keys are serial, UNIX does not need activation, so I am getting confused.
 

10 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

SCO Unixware 2.1

I am using SCO Unixware 2.1 & some PC clients are connected, suddenly one message appearslike : UX:strintercept error: dropping message this message starts coming repeatedly & agtre some time system hangs.I had to reset the system & now the problem is not there.Please suggest, why this is... (0 Replies)
Discussion started by: paprch
0 Replies

2. IP Networking

Change ip on UnixWare 2.1.2

I changed the IP whit Ifconfig and I used ping to test the conetions the conection is rigth on my LAN (NetA) But, I have two networks for example: NetA route to NetB and vicevers On NetB ping to any machine on NetA, it is respons successfully. but I ping to UNIX server no respons. I... (1 Reply)
Discussion started by: lmena
1 Replies

3. UNIX for Advanced & Expert Users

UnixWare printing

I have a Unixware OS and a HP Business Inkjet printer. I am unable to print from Unixware in landscape mode. I have tried filters and have failed every time. Any advice would be greatly appreciated. (6 Replies)
Discussion started by: sb4best
6 Replies

4. SCO

Performance issue from Unixware 2.1 to Unixware 7

Hello, I am having performance problem when , i ported a c code from Unixware 2.1 to Unixware 7.0.0. My program establishes a synchornous connection with the client in a windows OS and then sends and receives messsages using the recv and send calls. What i hyave noticed is that after a... (0 Replies)
Discussion started by: Amith
0 Replies

5. UNIX for Dummies Questions & Answers

please help me about unixware 7.1.3

msg: vfs_mountroot:cannot mount root %%%%%% system don't start (0 Replies)
Discussion started by: hushboy
0 Replies

6. SCO

Unixware problem

Dear All, I have a HP Netserver LH3 server which has unixware 7 os with oracle. Suddenly it shows a error message that " Raw Stack Dump beigns at 0xFFFDABIC... Generating Selective dump Storing system memory image for crash analysis.... #scanning memory....dumping to disk (Press any key to... (0 Replies)
Discussion started by: mr.chiranjib
0 Replies

7. SCO

unixware 2.0

High, I have a simulator application running on unixware 2.1, there are no original installation CDs for the application. is it possible to copy directories and configuration files, related to the installed application, from unixware 2.1 to other system running Unixware 7.1.1 (replacing Unixware... (0 Replies)
Discussion started by: fareedah
0 Replies

8. SCO

Problem in Unixware 7

Hi, I need help for SCO UNIXWARE 7.1.0. During booting it is detecting the network card (Intel PRO 100B /100+) but it is giving error : "UX:S69inet:error". Hence network is not getting up. I have tried with another network card (D-Link DFE 538TX) but unable to get the proper driver for the... (1 Reply)
Discussion started by: hcl.rajat
1 Replies

9. News, Links, Events and Announcements

Are the UnixWare 7.1.1 sources available?

So, I was browsing groklaw.net, and I was surprised to read that Pamela Jones was reading the copyright notices in the UnixWare 7.1.1 source code files... Groklaw - Santa Cruz Listed Novell as Owning the Copyrights in 1999 How can that be? Are the UnixWare 7.1.1 sources available to the... (1 Reply)
Discussion started by: pepinox
1 Replies

10. Homework & Coursework Questions

Print questions from a questions folder in a sequential order

1.) I am to write scripts that will be phasetest folder in the home directory. 2.) The folder should have a set-up,phase and display files I have written a small script which i used to check for the existing users and their password. What I need help with: I have a set of questions in a... (19 Replies)
Discussion started by: moraks007
19 Replies
crypt(1)																  crypt(1)

NAME
crypt - encode or decode a file SYNOPSIS
crypt [password] The crypt utility encrypts and decrypts the contents of a file. crypt reads from the standard input and writes on the standard output. The password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off printing while the key is being typed in. crypt encrypts and decrypts with the same key: example% crypt key < clear.file > encrypted.file example% crypt key < encrypted.file | pr prints the contents of clear.file. Files encrypted by crypt are compatible with those treated by the editors ed(1), ex(1), and vi(1) in encryption mode. The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space must be infeasible; "sneak paths" by which keys or cleartext can become visible must be minimized. crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on such machines are widely known, thus crypt provides minimal security. The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, that is, to take a substan- tial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read by expending only a substantial fraction of five minutes of machine time. Since the key is an argument to the crypt command, it is potentially visible to users executing ps(1) or a derivative command. To minimize this possibility, crypt takes care to destroy any record of the key immediately upon entry. No doubt the choice of keys and key security are the most vulnerable aspect of crypt. /dev/tty for typed key See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ des(1), ed(1), ex(1), ps(1), vi(1), attributes (5) 8 Mar 2005 crypt(1)
All times are GMT -4. The time now is 05:01 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy