Sponsored Content
Operating Systems OS X (Apple) BuDop's mbp:~ budop$ changes to dhcp-v062-202:~ budop$...not quite why? Post 302899649 by Corona688 on Wednesday 30th of April 2014 12:39:39 PM
Old 04-30-2014
Did you log into anyone else's account during the time when it changed? They may have a PS1 string that changed your terminal title.
 

5 More Discussions You Might Find Interesting

1. AIX

change user id from 200 to 202

Hi AIX Experts, i need your help in this issue, i want to change user id of xyz user from 200 to 202 note that this xyz user owner for many files and directories so my issue how to change the user id from 200 to 202 and the files still under his ownership this is an urgent work ,... (4 Replies)
Discussion started by: sh_day1
4 Replies

2. Homework & Coursework Questions

310-202 question

Hi guys, i need help : The system admin wants to configure user_attr(4)sources in the /etc/nsswitch.conf Which line needs to be configured? a: passwd b: user_attr The answer is A but wait !! I did a man nsswitch.conf and user_attr is a valid database ( at least for soalris 10) ,... (0 Replies)
Discussion started by: binary0011
0 Replies

3. Solaris

Solaris 10 310-202 Question

Hello All, Below I'm posting a question regarding a possible Solaris 10 310-202 exam question that I think is wrong. I do not agree that the answer is B. The inetadm command does not even have a flag/option of -a. Can anyone provide any assistance? Thanks! You've tried connecting to... (2 Replies)
Discussion started by: VeeDub78
2 Replies

4. IP Networking

Get DHCP relay interfaces IP address using DHCP

Hi All , please view the set up below: ------------------------------------------------------------------- | DHCP Server |-----------| ROUTER & |-----------| Clients | | 192.168.99.1 | - -<eth1>| DHCP-RELAY|<eth2>-- | 192.168.88.X | ... (2 Replies)
Discussion started by: gdangoor
2 Replies

5. OS X (Apple)

Let your iMac/MBP detect a burglar whilst idle...

Hi folks... (Apologies for typos.) I have been working on a very simple MacBook_Pro/iMac centric project. I have called it Spy . If you just want to test for fun you only need ./Spy and this defaults to a 5 second video with Medium sensitivity from the working directory whre Spy is. (Just... (1 Reply)
Discussion started by: wisecracker
1 Replies
login(1)						      General Commands Manual							  login(1)

NAME
login - Signs the user on to the system SYNOPSIS
login [-p] [-h host] [[-f] user] The login command is used when a user initially signs on to the system and also by daemons, such as ftp, to create a user's environment. This security-sensitive command uses the Security Integration Architecture (SIA) routine as an interface to the security mechanism(s) that perform the actual user validation. See the matrix.conf(4) reference page for more information. OPTIONS
With the exception of -p, these options are available only to the superuser. Used by telnetd and other servers to list the host from which the connection was received. Used with a user name user on the command line to indicate that proper authentication was already done, and that no password needs to be requested. Causes the remainder of the environment to be preserved; otherwise, any previous environment is discarded. DESCRIPTION
The invocation of login for initial signon is made by a system program or server using the privileged -h and -f forms of the login command. If login is invoked without an argument, it asks for a user name, and, if appropriate, a password. Echoing is turned off (if possible) during the entering of the password, so it will not appear on the written record of the session. After a successful login, accounting files are updated. You are informed of the existence of mail, and the message of the day and the time of last login are displayed. The mail message, the message of the day, and the last login time are suppressed if there is a file in the home directory; this is mostly used to make life easier for users such as uucp. Security Note If you have enhanced security installed on your system, the login command prints the last successful and unsuccessful login times and ter- minal devices. If the account does not have a password and the authentication profile for the account requires one, login starts the passwd command to establish one for the account. The login command prohibits you from logging in if any of the following are true: The password for the account has expired and you cannot successfully change the password. The password lifetime for the account has passed. The administrative lock on the account was set. The maximum number of unsuccessful login attempts for the account was exceeded. The maximum number of unsuccessful login attempts for the ter- minal was exceeded. The administrative lock on the terminal was set. The terminal has an authorized user list and you are not on it. The terminal has time of day restrictions and the current time is not within them. The account was retired by the system administrator. The login command initializes the user and group IDs and the working directory, and then executes a command interpreter according to spec- ifications found in the password file. Argument 0 (zero) of the command interpreter is the name of the command interpreter with a leading - (dash). The login command also modifies the environment with information specifying home directory, command interpreter, terminal type (if avail- able), and user name. Security Note If you have enhanced security installed on your system, the login command always allows root to log in at the console to avoid the situa- tion where all accounts and terminals are locked. If either /etc/nologin_hostname or /etc/nologin exists, login prints the contents on your terminal and exits. The shutdown command creates /etc/nologin_hostname (or /etc/nologin in the case of a clusterwide shutdown) to stop users from logging in when the system or cluster is about to go down. Login is recognized by sh, csh, and ksh and executed directly (without forking). ERRORS
The user name or the password is invalid. Consult your system administrator. Security Note If you have enhanced security installed on your system, you may see the following diagnostic messages: The login command cannot invoke the passwd program. The passwd program is invoked, the user is unable to change the password, and the account requires one. is allowed The login command is allowing a root login at the system console, despite a condition that would normally not allow such a login. The account is locked for one of the reasons previously listed. The terminal is locked for one of the reasons previously listed. You are not on the authorized user list for the terminal. The current time is not within the current time-of-day restrictions for the terminal. After an unsuccessful login attempt, login waits a specified (configurable) amount of time before it prompts for another login attempt. If the account's password was changed by another user, login prints the time the password was changed and the user who changed it. If your password is about to expire, login warns you of the time of the impending expiration. Your system administrator sets the warning period. FILES
Contains user and accounting information. Contains login history. Contains last login time stamps. Mail directory. Message of the day. Contains user information. Stops logins. In a cluster, /etc/nologin is used instead. Suppresses mail notification, message of the day, and last login time. SEE ALSO
Commands: binmail(1), chfn(1), chsh(1), getty(8), init(8), Mail(1), mail(1), mailx(1), passwd(1), rlogin(1), shutdown(8) Function: getpass(3) Files: matrix.conf(4), passwd(4), utmp(4) Security login(1)
All times are GMT -4. The time now is 03:16 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy