02-21-2017
<joke>
"If there's an error, it's probably on line 42." [(c) Hitchhiker's Guide to the Galaxy]
</joke>
This User Gave Thanks to vgersh99 For This Post:
10 More Discussions You Might Find Interesting
1. Linux
We have requirments to not allow a userid login abilities but allow users to 'su' to it. In solaris I normally set the shell in /etc/passwd to bin/false. THis does not work on Linux, any suggestions would help. (1 Reply)
Discussion started by: bryanthomas
1 Replies
2. Shell Programming and Scripting
i want to delete every newline and every line which starts with "RECORD......." in a file.
FILE:
Record 61391 in base BROCKHAUS (Timestamp: 2008-04-09 11:38:38)
UNTERTITEL :
Gräfin (seit 1707 Reichsgräfin) von, * Schwerin 4. 2. 1686, + Berlin
21. 10. 1744; wurde
Record 61392 in base BROCKHAUS... (4 Replies)
Discussion started by: trek
4 Replies
3. Shell Programming and Scripting
Hi,
I'm new to UNIX and am trying to learn shell scripting in order to work on an interface that I inherited when a co-worker left. I need to be able to check to see whether a file exists to determine whether the FTP has taken place, but in testing, the if statement always evaluates as false,... (3 Replies)
Discussion started by: JeffR
3 Replies
4. UNIX for Advanced & Expert Users
helo
helo I have create user for the group and entry for the user in /etc/passwd file is liek this
bhavin:x:2014:109:test:/home/pds_RBAC:/bin/false
I have keep here /bin/false
now i m accesing user through sftp
ow when i access that user using sftp from the another linux pc
for e.g... (1 Reply)
Discussion started by: amitpansuria
1 Replies
5. Solaris
Hi Experts,
I am using Solaris-10, Sun-Fire-V445.
i got often the below message-
"Memory Usage – Critical, Memory usage (RAM) exceeding 90%
The memory utilization is exceeding 90%" in a application running on solaris.
I checked with Vmstat. Everything seems to be fine. Where i should... (5 Replies)
Discussion started by: thepurple
5 Replies
6. Shell Programming and Scripting
Hi All,
I am using the below Script to enter a line in the File:
#!/bin/ksh
# To delete the last line if it contains the pattern Redirect permanent / Virgin Atlantic Airways - Popup
echo "Enter the URL that should point to the particular microsite"
read url
# To delete the last line if it... (0 Replies)
Discussion started by: Shazin
0 Replies
7. IP Networking
Why this happens?
How to solve this?
$netstat -na |grep 9325
tcp 0 0 127.0.0.1:9325 127.0.0.1:9325 ESTABLISHED
When a client socket repeatedly tries to connect to an inactive(no server socket is listening on this port) local port,connect succeeds.
... (1 Reply)
Discussion started by: johnbach
1 Replies
8. AIX
Checking configuration access files for an AIX server, left me wondering about this :confused::
If a user is added to system group, it gets gid=0 with some security risks because it gets some root kind of file access level.
Is this insecure condition kept if the user has admin variable... (0 Replies)
Discussion started by: bkiddo
0 Replies
9. Red Hat
Hello All,
Nagios seems to be sending false alerts about few hosts, (ex: There were no users on one host and still Nagios was reporting a critical alert and says 6 users are logged in. How do I fix this one?
Also, I have installed nagios and added 12 hosts as a start and monitoring few... (4 Replies)
Discussion started by: lovesaikrishna
4 Replies
10. Shell Programming and Scripting
Hi All
Below code is working as expected but creating too many child processes when the url is not up and every minute that process is sending false email alerts
any help with the logic not to generate child process and not to send duplicate alerts
app="https://url"
appresult=$(wget... (2 Replies)
Discussion started by: srilinux09
2 Replies
LEARN ABOUT ULTRIX
passwd
passwd(5) File Formats Manual passwd(5)
Name
passwd - password file
Description
The file is an ASCII file that contains the following information for each user:
Login name
Password field
User ID
Group ID
User's real name, office, extension, home phone
Initial working directory
Program to use as Shell
Each line in the file represents a user entry. Each field within a user entry is separated from the next by a colon. Each user entry is
separated from the next by a new line. If the password field is null, no password is demanded; if the Shell field is null, then is used.
This file resides in directory Because the password, if present, is encrypted, the file has general read permission and can be used, for
example, to map user IDs to names.
The ``user's real name'' can contain an ampersand (&), meaning insert the login name. This information is set by the command and used by
the command.
Appropriate precautions must be taken to lock the file against changes if it is to be edited with a text editor. The command does the nec-
essary locking.
If the system is running UPGRADE security level and an asterisk appears in the password field, or if the system is running ENHANCED level,
then the content of the password field is ignored and the password for the account is located in the authentication database. See and the
Security Guide for Administrators for more information.
The files and if they exist, contain the hashed version of the file. If present, they are used by the and functions to retrieve entries
rapidly. See for more information.
The database can be distributed in a network by a naming service, such as Yellow Pages or BIND/Hesiod. See the Guide to the Yellow Pages
Service or the Guide to the BIND/Hesiod Service for setup information.
Restrictions
The ``name'' can contain only lowercase ASCII characters a to z and the numbers 0 to 9.
Files
See Also
chfn(1), finger(1), login(1), passwd(1), crypt(3), getpwent(3), auth(5), group(5), adduser(8), mkpasswd(8), vipw(8)
Guide to the BIND/Hesiod Service
Guide to the Yellow Pages Service
Security Guide for Administrators
passwd(5)