Sponsored Content
Top Forums Shell Programming and Scripting How to list users without MD5 encrypted password? Post 302961824 by agent.kgb on Friday 4th of December 2015 06:58:42 AM
Old 12-04-2015
I think, it is already approx. 10 years at least, as MD5 is considered insecure.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

netrc file encrypted password

Hi, I do not want the plaintext password to appear in the netrc file. So I want to encrypt the password. Is there a way to encrypt the password and still make ftp to use the netrc ? Thanks in advance. -Gow:confused: (2 Replies)
Discussion started by: ggowrish
2 Replies

2. UNIX for Dummies Questions & Answers

Change password by pushing encrypted password to systems

I'm tasked to change a user's password on multiple Linux systems (RH v3). I though copying the encrypted password from one Linux /etc/shadow file to another would work but I was wrong. The long term solution is to establish an openLDAP Directory service, but for now I'm stuck with a manual... (1 Reply)
Discussion started by: benq70
1 Replies

3. UNIX Desktop Questions & Answers

list the password settings for all the users

Hi!! How can I list the password settings for all the users?? Best regards (3 Replies)
Discussion started by: irasela
3 Replies

4. UNIX for Dummies Questions & Answers

User Name and Password List/adding and removing users.

Hello everyone and let me start off by thanking anyone who can help with this. I work for a company that uses Unix as one of their servers. I'm not at all familar with Unix beyond logging after I restart the server:rolleyes: I'm looking for some command that will bring me up a list of current... (3 Replies)
Discussion started by: disgracedsaint
3 Replies

5. Shell Programming and Scripting

To decrypt encrypted password

Hi folks, What will be the easy way to decrypt encrypted passwords on MySQL table. Googling brought me many suggestions on crypt/decrypt running scripts. Please advise. TIA Remark: I think the encrypt function of MySQL uses the Unix crypt command to encrypt B.R. satimis (1 Reply)
Discussion started by: satimis
1 Replies

6. UNIX for Advanced & Expert Users

/etc/shadow encrypted password

Hi I wonder whether is possible to generate enrypted passwd for some user and paste it into /etc/shadow file ? What kind of encryption is used in /etc/shadow file ? ths for help. (1 Reply)
Discussion started by: presul
1 Replies

7. Linux

Convert MD5 password to SHA-512?

Hi, Is it possible to convert MD5 passwords to SHA-512? I'm about to migrate an old slackware server to Debian, then I noticed that they don't use same encryption method. I'm aware that I can change the encryption method in Debian to MD5, but as far as I understand SHA-512 is more secure,... (2 Replies)
Discussion started by: urandom
2 Replies

8. UNIX for Dummies Questions & Answers

Using the encrypted password of the shadow file

i have an application that uses the encrypted password that's in the /etc/shadow file. i copied the line for the particular username i was interested it in from shadow file and i pasted it into the password file of the application. the application is nagios. this application allowed that... (5 Replies)
Discussion started by: SkySmart
5 Replies

9. Shell Programming and Scripting

Encrypted password in script

How to keep encrypted password in a shell script.? I have the file which has the following: a.sh ----- username=abc password=abc I will be using this username and password in another script. But I don't want to reveal the password in the script. How to keep the password... (3 Replies)
Discussion started by: sanvel
3 Replies

10. Cybersecurity

Is TLS encrypted password safe?

Hello, on my android device my app autosaves my password and it encrypts by TLS im not politically exposed person, just regular entrepreneur. Should i worry if i loose my phone with TLS encrypted password? Or regular mortals or casual hackers are not able to crack it? (4 Replies)
Discussion started by: postcd
4 Replies
APPROX-IMPORT(8)					      System Manager's Manual						  APPROX-IMPORT(8)

NAME
approx-import - copy local .deb files into the approx cache SYNOPSIS
approx-import [OPTION]... file.deb ... DESCRIPTION
approx-import copies local .deb files, such as those found in /var/cache/apt/archives, into the approx(8) cache. It does so by computing the MD5 checksum of each argument. If it matches a package in one of the Packages files in the approx(8) cache, then the file is copied to the appropriate location in the cache. Note that all Packages files must be scanned, regardless of how many .deb files are being imported, and this process may take several min- utes. The approx-import command must be run by the superuser or the approx(8) user. OPTIONS
-c file, --config file Specify an additional configuration file. May be used multiple times. -s, --simulate Process files but do not actually copy them into the cache. -q, --quiet Don't print the names of files that are imported. -v, --verbose Print the disposition of each file. EXAMPLES
To import packages from the local apt(8) cache: approx-import /var/cache/apt/archives/*.deb To import packages from another proxy's cache: find other-cache -name "*.deb" | xargs approx-import (where other-cache is the pathname of the other proxy's cache directory) FILES
/etc/approx/approx.conf Configuration file for approx and related programs. /var/cache/approx Default cache directory for archive files. SEE ALSO
approx.conf(5), approx(8) AUTHOR
Eric Cooper <ecc@cmu.edu> June 2010 APPROX-IMPORT(8)
All times are GMT -4. The time now is 07:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy