No matter how it got there, after the string is built you have "hello" sitting in core. Don't let it sit for long.
I don't understand your second question at all. The whole purpose of that script is to read a password that a human types in. That is the only way to have true security. It is always possible to reverse engineer a program that secretly builds a password and discover what that password is.
Hello everyone,
i am new to unix and still learning about different commands. Can some one tell me how can i hide my directory name. For instance someone is logged in a directory named $ .
I've seen some people hiding their above path name by just one word or letter like $ in order to keep... (7 Replies)
Hi all
I am new to unix...... i am working on HP-UX
I like to know how to hide files and how to view hided files created
by other users also
please help me
Sireesha (1 Reply)
Hi everybody,
Do you know how to hide the text for interactive unix shell script? Just like the case for inputting password during logon.
Patrick (1 Reply)
Hi all,
i have a perl script for my users to run. My sys admin created an account for the users to log in and execute the script. They just type "perl myscript.pl" at the unix prompt to run it. Is there any way that i can hide my script? ,ie, do not allow my users to view the script. either... (5 Replies)
All,
In my script I am calling another script.. in that script I need to enter a password. Problem is that everyone is able to see the password when I enter that. Is there any way that when i enter that password it should not display or may look like *******.
Or if there any other way that I... (1 Reply)
hello everybody,
i would like to hide visibility of the folders , i.e. not to giving any physically visibility to any users . Is there any way to do it other than changing the permission and adding "." post folder name .
by changing the permission , we cann't do any activity , but have... (1 Reply)
Hi,
By reporting the process status with ps, any Unix user will see the command line arguments
#ps -ef
UID PID PPID C STIME TTY TIME CMD
lsc 13837 13825 0 May 11 pts/17 0:01 -ksh
oracle 4698 6294 0 12:00:40 ? 0:00 sqlplus -s system/manager
appluser 4229 4062 0 12:00:03... (2 Replies)
I'm listing the files in a particular directory using the ls command...
$ ls -ogh
total 9.4G
-rw-r--r-- 1 1.9G Nov 4 02:29 file1.tar
-rw-r--r-- 1 1.9G Nov 11 03:11 file2.tar
-rw-r--r-- 1 1.9G Nov 18 02:55 file3.tar
-rw-r--r-- 1 1.9G Nov 25 03:11 file4.tar
-rw-r--r-- 1 1.9G Dec 2 02:46... (3 Replies)
Hi,
I my unix we have one file that contains all the database credentials.
we are calling that file while connecting databse.
I need to hide that file....other user should not view that file.
How to do this. Please suggest me apart from permisstion(chmod) level suggestion.
Regards,... (3 Replies)
Discussion started by: rsivasan
3 Replies
LEARN ABOUT BSD
encrypt
CRYPT(3) Library Functions Manual CRYPT(3)NAME
crypt, setkey, encrypt - DES encryption
SYNOPSIS
char *crypt(key, salt)
char *key, *salt;
setkey(key)
char *key;
encrypt(block, edflag)
char *block;
DESCRIPTION
Crypt is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended (among other things)
to frustrate use of hardware implementations of the DES for key search.
The first argument to crypt is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./].
The salt string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt
repeatedly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two char-
acters are the salt itself.
The other entries provide (rather primitive) access to the actual DES algorithm. The argument of setkey is a character array of length 64
containing only the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group
is ignored, leading to a 56-bit key which is set into the machine.
The argument to the encrypt entry is likewise a character array of length 64 containing 0's and 1's. The argument array is modified in
place to a similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by
setkey. The edflag flag is ignored; the argument can only be encrypted.
SEE ALSO passwd(1), passwd(5), login(1), getpass(3)BUGS
The return value points to static data whose content is overwritten by each call.
7th Edition August 12, 1986 CRYPT(3)