Is there any best way to restrict some of the listed files when you do ls. In the output i am doing grep -v wanted to see if i can use a better command to get this output.
Command:
Code:
[infrmtca@510146-DWDBDV01.farmcreditfunding.com]> ls -lrt wf_Load_25.log.INSTANCE_21_20072.*
-rw-r--r-- 1 infrmtca infrmtca 19373 Mar 12 14:14 wf_Load_25.log.INSTANCE_21_20072.1144.20140312141429.bin
-rw-r--r-- 1 infrmtca infrmtca 14149 Mar 12 14:14 wf_Load_25.log.INSTANCE_21_20072.1144.20140312141429
Output:
Code:
[infrmtca@510146-DWDBDV01.farmcreditfunding.com]> ls wf_Load_25.log.INSTANCE_21_20072.* | grep -v bin
wf_Load_25.log.INSTANCE_21_20072.1144.20140312141429
restricted access...
Hi
I need to restrict users shell access to only $HOME under /home for each user. I don't want them getting out of their own directories. From what I understand chroot is something I could use, but I want to avoid this since it involves creating symbolic links to a number... (9 Replies)
I need to create a user that only has access to 1 directory (e.g. /vol/mita/test). The user needs to be able to rsh into that directory to run a script. The user should not be able to navigate to any other directories above /vol/mita/test. Any help would be appreciated! (4 Replies)
Hi All,
I'm on Solaris 8, I need to provide Read-only access to a user to 2 directories only.
Using rsh (restricted shell) as the user's login shell, I can restrict the user's access to a certain directory only, but how can I set in such a way that the user can access only the 2 directories... (4 Replies)
I'm the admin in a shop in which my developers have and use the root account, all UNIX newbies.
I've been unable to convince management myself that this is an unacceptable practice.
I've looked in a couple books I have and can't find any chapters, discussions, etc that make the argument that... (2 Replies)
Hello,
For one of our servers, we have had people trying to illegally loggon using the ssh service.
My manager has asked me to restrict ssh access to users in our internal network but close ssh access to the "outside" world.
Could someone at the very least point me to some resources on the... (7 Replies)
I am working on a problem in which I need to merge 4 files (say f1,f2,f3 & f4 log files) & then prepare a final file.
1) If the final file created has size more than 1 GB then need to throw error (display error).
2) Need to check after every merge (say f1 + f2, f1 + f2 + f3) that whether... (2 Replies)
Hello,
I need to restrict the mails going from any codes to a particular domain.
For example - No mail from any code should go to any email address with domain as abc.com - example - xyz@abc.com
Do we have any way to do it?
Thanks (2 Replies)
OK. So I can prevent remote systems from logging in as root by uncommenting the CONSOLE entry /etc/default/login.
BUT, is there a way to stop su - (when already logged in as own user)?
The way we do it is to set up sudoers so users who need access can do sudo su - (2 Replies)
Discussion started by: psychocandy
2 Replies
LEARN ABOUT SUSE
nwbols
NWBOLS(1) nwbols NWBOLS(1)NAME
nwbols - List NetWare Bindery Objects
SYNOPSIS
nwbols [ -h ] [ -S server ] [ -U user name ] [ -P password | -n ] [ -C ] [ -t type ] [ -o pattern ] [ -v ]
DESCRIPTION
nwbols lists the specified NetWare Bindery Objects visible for the user.
nwbols looks up the file $HOME/.nwclient to find a file server, a user name and possibly a password. See nwclient(5) for more information.
Please note that the access permissions of $HOME/.nwclient MUST be 600 for security reasons.
OPTIONS -h
-h is used to print out a short help text.
-S server
server is the name of the server you want to use.
-U user
user is the user name to use for login.
-P password
password is the password to use for login. If neither -n nor -P are given, and the user has no open connection to the server, nwbols
prompts for a password.
-n
-n should be given if no password is required for the login.
-C
By default, passwords are converted to uppercase before they are sent to the server, because most servers require this. You can turn off
this conversion by -C.
-t type
You can restrict the objects listed by specifying the type of the objects to be listed. type must be given as a decimal number.
-o pattern
Specifying a pattern is another way to restrict the objects listed. Please note that this pattern is evaluated by the NetWare server.
grep would be a better candidate for complex patterns.
-v
By default, the object's name, its ID and its type are listed by nwbols. In the verbose mode, activated by -v, the object flags, its
security byte and the properties flag is also listed.
AUTHORS
nwbols was written by Volker Lendecke. See the Changes file of ncpfs for other contributors.
nwbols 7/9/1996 NWBOLS(1)