08-12-2014
No, everybody, uses the same login name to log into the application, there is no way who did what, maybe my english is not that perfect as its not my first language
10 More Discussions You Might Find Interesting
1. HP-UX
Hi Mentors,
I have a unix box HPC8000 HPUX 11.11 had just a problem loging in on CDE
using ordinary account.
The problem looks like this when an ordinary account will login to it will automatically closed and the login promtp will appear.
If the root will login no problem at all.
I tried... (0 Replies)
Discussion started by: eykyn17
0 Replies
2. UNIX for Dummies Questions & Answers
Is there a way to easily change an account to be a non login account (NP in the shadow) file?
I know I can just edit the file but that is not what we want to do. We use access control software and want to provide a way to set an account to be non-login using simple commands that can be mapped... (0 Replies)
Discussion started by: LordJezo
0 Replies
3. UNIX Desktop Questions & Answers
How do you access a terminal and create a Unix user account. I am new to this form, so, is there a way to log on to a unix account that this forum offers to practice Unix. Is there a server available (somewhere) to users of this forum to access unix? So far the research I have found refers a person... (2 Replies)
Discussion started by: brendar
2 Replies
4. Post Here to Contact Site Administrators and Moderators
Moderator,
I had to create a new user acct because my old one does not work. It will not allow me to login because of permissions problems.
Can you please re-activate my old user id: gzs553
I think the email address for my old account is *****removed***** and once you reset my account,... (0 Replies)
Discussion started by: kflanigan
0 Replies
5. Linux
Hi,
How to find remote Linux box login account without login in to that box?
I don't have login account at my remote Linux box. But I need who are all having login account. How do I findout?
Thanks,
--Muthu. (3 Replies)
Discussion started by: Muthuselvan
3 Replies
6. UNIX for Dummies Questions & Answers
Hi All,
I was reading a tutorial for Installing Tomcat on Linux machine.
(http://www.puschitz.com/InstallingTomcat.html)
Here the author had mentioned that: For security reasons I created a user account with no login shell for running the Tomcat server.
My question is:
1. What is a User... (6 Replies)
Discussion started by: jw_amp
6 Replies
7. AIX
Hi there,
I am new to AIX environment, when I set up NIS Client for an AIX 5.3 Machine to connect to a Linux NIS Master, everything seems to be okie:
/etc/passwd: +::0:0:::
/etc/group: +:
ps -ef | egrep "ypbind": /usr/lib/netsvc/yp/ypbind -ypsetme -ypsetme
I can get all account... (0 Replies)
Discussion started by: quanba
0 Replies
8. AIX
I want to learn AIX. I would like to find someone who would be willing to give me a login to their AIX home lab server. My intent is to poke around and discover the similarities and differences of AIX compared to other *NIXs.
I am a UNIX admin so I can think of what some immediate concerns may... (1 Reply)
Discussion started by: perl_in_my_shel
1 Replies
9. Forum Support Area for Unregistered Users & Account Problems
my username is coolatt..thanks to do needful. (3 Replies)
Discussion started by: coolatt
3 Replies
10. UNIX for Beginners Questions & Answers
Hello... and thanks in advance for reading this or offering me any assistance
I'm trying to understand specific differences between the various login scripts... I understand the differences between interactive vs non-interactive and login vs non-login shells... and that's not where my question... (4 Replies)
Discussion started by: bodisha
4 Replies
LEARN ABOUT DEBIAN
bup-margin
bup-margin(1) General Commands Manual bup-margin(1)
NAME
bup-margin - figure out your deduplication safety margin
SYNOPSIS
bup margin [options...]
DESCRIPTION
bup margin iterates through all objects in your bup repository, calculating the largest number of prefix bits shared between any two
entries. This number, n, identifies the longest subset of SHA-1 you could use and still encounter a collision between your object ids.
For example, one system that was tested had a collection of 11 million objects (70 GB), and bup margin returned 45. That means a 46-bit
hash would be sufficient to avoid all collisions among that set of objects; each object in that repository could be uniquely identified by
its first 46 bits.
The number of bits needed seems to increase by about 1 or 2 for every doubling of the number of objects. Since SHA-1 hashes have 160 bits,
that leaves 115 bits of margin. Of course, because SHA-1 hashes are essentially random, it's theoretically possible to use many more bits
with far fewer objects.
If you're paranoid about the possibility of SHA-1 collisions, you can monitor your repository by running bup margin occasionally to see if
you're getting dangerously close to 160 bits.
OPTIONS
--predict
Guess the offset into each index file where a particular object will appear, and report the maximum deviation of the correct answer
from the guess. This is potentially useful for tuning an interpolation search algorithm.
--ignore-midx
don't use .midx files, use only .idx files. This is only really useful when used with --predict.
EXAMPLE
$ bup margin
Reading indexes: 100.00% (1612581/1612581), done.
40
40 matching prefix bits
1.94 bits per doubling
120 bits (61.86 doublings) remaining
4.19338e+18 times larger is possible
Everyone on earth could have 625878182 data sets
like yours, all in one repository, and we would
expect 1 object collision.
$ bup margin --predict
PackIdxList: using 1 index.
Reading indexes: 100.00% (1612581/1612581), done.
915 of 1612581 (0.057%)
SEE ALSO
bup-midx(1), bup-save(1)
BUP
Part of the bup(1) suite.
AUTHORS
Avery Pennarun <apenwarr@gmail.com>.
Bup unknown- bup-margin(1)