Wipe it out means something like this:
No matter how it got there, after the string is built you have "hello" sitting in core. Don't let it sit for long.
I don't understand your second question at all. The whole purpose of that script is to read a password that a human types in. That is the only way to have true security. It is always possible to reverse engineer a program that secretly builds a password and discover what that password is.
Hello everyone,
i am new to unix and still learning about different commands. Can some one tell me how can i hide my directory name. For instance someone is logged in a directory named $ .
I've seen some people hiding their above path name by just one word or letter like $ in order to keep... (7 Replies)
Hi all
I am new to unix...... i am working on HP-UX
I like to know how to hide files and how to view hided files created
by other users also
please help me
Sireesha (1 Reply)
Hi everybody,
Do you know how to hide the text for interactive unix shell script? Just like the case for inputting password during logon.
Patrick (1 Reply)
Hi all,
i have a perl script for my users to run. My sys admin created an account for the users to log in and execute the script. They just type "perl myscript.pl" at the unix prompt to run it. Is there any way that i can hide my script? ,ie, do not allow my users to view the script. either... (5 Replies)
All,
In my script I am calling another script.. in that script I need to enter a password. Problem is that everyone is able to see the password when I enter that. Is there any way that when i enter that password it should not display or may look like *******.
Or if there any other way that I... (1 Reply)
hello everybody,
i would like to hide visibility of the folders , i.e. not to giving any physically visibility to any users . Is there any way to do it other than changing the permission and adding "." post folder name .
by changing the permission , we cann't do any activity , but have... (1 Reply)
Hi,
By reporting the process status with ps, any Unix user will see the command line arguments
#ps -ef
UID PID PPID C STIME TTY TIME CMD
lsc 13837 13825 0 May 11 pts/17 0:01 -ksh
oracle 4698 6294 0 12:00:40 ? 0:00 sqlplus -s system/manager
appluser 4229 4062 0 12:00:03... (2 Replies)
I'm listing the files in a particular directory using the ls command...
$ ls -ogh
total 9.4G
-rw-r--r-- 1 1.9G Nov 4 02:29 file1.tar
-rw-r--r-- 1 1.9G Nov 11 03:11 file2.tar
-rw-r--r-- 1 1.9G Nov 18 02:55 file3.tar
-rw-r--r-- 1 1.9G Nov 25 03:11 file4.tar
-rw-r--r-- 1 1.9G Dec 2 02:46... (3 Replies)
Hi,
I my unix we have one file that contains all the database credentials.
we are calling that file while connecting databse.
I need to hide that file....other user should not view that file.
How to do this. Please suggest me apart from permisstion(chmod) level suggestion.
Regards,... (3 Replies)
Discussion started by: rsivasan
3 Replies
LEARN ABOUT ULTRIX
crypt
crypt(3) Library Functions Manual crypt(3)Name
crypt, crypt16, setkey, encrypt - DES encryption
Syntax
char *crypt(key, salt)
char *key, *salt;
char *crypt16(key, salt)
char *key, *salt;
void setkey(key)
char *key;
Description
The subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate
use of hardware implementations of the DES for key search.
The first argument to is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./]. The salt
string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeat-
edly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two characters
are the salt itself.
The subroutine is identical to the function except that it will accept a password up to sixteen characters in length. It generates a longer
encrypted password for use with enhanced security features.
The other entries provide primitive access to the actual DES algorithm. The argument of is a character array of length 64 containing only
the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group is ignored, lead-
ing to a 56-bit key which is set into the machine.
The argument to the entry is likewise a character array of length 64 containing 0s and 1s. The argument array is modified in place to a
similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by If edflag is 0,
the argument is encrypted; if non-zero, it is decrypted.
Restrictions
The return values from and point to static data areas whose content is overwritten by each call.
Environment
Default Environment
In the default environment on systems that do not have the optional encryption software installed the function expects exactly one argu-
ment, the data to be encrypted. The edflag argument is not supplied and there is no way to decrypt data. If the optional encryption soft-
ware is installed the function behaves as it does in the POSIX environment. The syntax for the default environment follows:
void encrypt(block)
char *block;
POSIX Environment
In the POSIX environment the encrypt function always expects two arguments. The function will set errno to ENOSYS and return if edflag is
non-zero and the optional encryption software is not present. The syntax for the POSIX environment follows:
void encrypt(block, edflag)
char *block;
int edflag;
In all cases the function will set errno to ENOSYS and return if the optional encryption software is not present.
See Alsologin(1), passwd(1), yppasswd(1yp), getpass(3), auth(5), passwd(5), passwd(5yp)
ULTRIX Security Guide for Users and Programmers
crypt(3)