11-26-2018
I'm putting my thoughts in writing here. Unfortunately, I cannot derive a definitive answer from the information that you have provided so I just resort to a series of statements in the hope of it being helpful.
I notice from one of your screen captures that the system date is 1/1/2000. Is the backup battery on the mobo dead? Has this hardware been idle for ages?
Did you have to login to the SC before it would let you do anything? userid/passwd combination? If the hardware has lost all its memory due to a dead battery then the userid/passwd combination to use will be admin/changeme or root/changeme.
This warning implies that your poweron command is not being executed due to no valid SC login:
Quote:
Warning: the poweron command is being ignored because the password for admin is not set.
The 'poweron' command turns on the whole main processor. AFAIR, there are no individual power commands for individual components. However, if your 'poweron' command is not executing then there is no surprise that the DVD is dead. If 'poweron' is doing its job then perhaps the DVD is faulty? Remove it and test on other hardware.
Last edited by hicksd8; 11-26-2018 at 01:10 PM..
These 2 Users Gave Thanks to hicksd8 For This Post:
10 More Discussions You Might Find Interesting
1. Linux
we hv a big enviroment networked.
we use squid proxy.
access allowed by src address previously.
we have win2000 network with ads.
my requirement is the proxy should allow domain users only for access.
how can i map my windows userdatabase with squid
is there any thing specific which has 2 b... (1 Reply)
Discussion started by: sriram.s
1 Replies
2. UNIX for Dummies Questions & Answers
Hi, I'm a newbie.
I need help on my first assignment in UNIX.
1. How do I determine the number of non-empty directories?
I was told to create a variable ARCHIVE, which points to the directory that contains the archive of the messages. But I'm so dumb and I don't even know how to do this.
2. In... (1 Reply)
Discussion started by: hygsg
1 Replies
3. UNIX for Dummies Questions & Answers
Hi every one
I have got very very bad Email, My question is:
How can I get all information about that f*** Email, I do mean
IP,reall name, Adress, user name, password etc... I wonder if there is any program or website that I can see that email, help me please
When I used windows Xp(old... (2 Replies)
Discussion started by: Cano
2 Replies
4. UNIX for Dummies Questions & Answers
Hi...
Why should I press F1 to start windows?! I have Xp in my computer... thx 4 help
Cano (1 Reply)
Discussion started by: Cano
1 Replies
5. Shell Programming and Scripting
I have a list of variables: ss1, ss5, ss6, ss8, st2 etc. (these values are not fixed, configurable). Now, I have assigned ss5=”test”. And I want to search in the list for the string “test” to know which variable is having the value “test”. Can u pls tell me how to do this? (10 Replies)
Discussion started by: kanchan_cp
10 Replies
6. Shell Programming and Scripting
Hi,
I need your help guys. I have two data files, namely 101.amberized.pdb & 101.pdb .
Now I want to replace the whole 3rd column of 101.amberized.pdb with the 3rd column of 101.pdb file. How do I do it in shell?
Thanks in advance
Parimal (11 Replies)
Discussion started by: chuchu
11 Replies
7. Shell Programming and Scripting
When i run this command, everything is ok. The file can be email and attached but soon after i download the file, the file cant be read. It's seem corrupted. Totally cant be read although i'm using context or wordfile. Original file generated at ek_bkup/alert/tbspace_datafile.log is OK.....
... (7 Replies)
Discussion started by: adzuanamir
7 Replies
8. UNIX for Dummies Questions & Answers
I have this code:
#!/bin/sh
awk 'BEGIN
NR == 2
repl = "PHI"
$4 = repl
print $0 'dryloop.txt
and this code:
#!/bin/sh
sed -e '1s/\|$/\|COMID\|/g' -e 's/^087.*$/&PHI\|g' hl.dsldryloop > textdry.txt
My code won't work. I want to change the COMID of lines starting with 087 .
this is my... (15 Replies)
Discussion started by: arkhei
15 Replies
9. Homework & Coursework Questions
How to find the ten most common words in a file (1 Reply)
Discussion started by: jass
1 Replies
10. Solaris
Greetings,
I hope my post finds you all OK,
I have a Netra240 server in an HLR inside a wireless CDMA Exchange, it works as a Hard Disk Unit (HDU) as shown in Local Management Terminal (LMT) as show in the picture 1 attached.
The power went down because of a power failure in main UPS, when... (2 Replies)
Discussion started by: Sharista
2 Replies
PWCK(8) System Management Commands PWCK(8)
NAME
pwck - verify integrity of password files
SYNOPSIS
pwck [-q] [-s] [passwd [ shadow ]]
pwck [-q] [-r] [passwd [ shadow ]]
DESCRIPTION
The pwck command verifies the integrity of the users and authentication information. It checks that all entries in /etc/passwd and
/etc/shadow have the proper format and contain valid data. The user is prompted to delete entries that are improperly formatted or which
have other uncorrectable errors.
Checks are made to verify that each entry has:
o the correct number of fields
o a unique and valid user name
o a valid user and group identifier
o a valid primary group
o a valid home directory
o a valid login shell
shadow checks are enabled when a second file parameter is specified or when /etc/shadow exists on the system.
These checks are the following:
o every passwd entry has a matching shadow entry, and every shadow entry has a matching passwd entry
o passwords are specified in the shadowed file
o shadow entries have the correct number of fields
o shadow entries are unique in shadow
o the last password changes are not in the future
The checks for correct number of fields and unique user name are fatal. If the entry has the wrong number of fields, the user will be
prompted to delete the entire line. If the user does not answer affirmatively, all further checks are bypassed. An entry with a duplicated
user name is prompted for deletion, but the remaining checks will still be made. All other errors are warning and the user is encouraged to
run the usermod command to correct the error.
The commands which operate on the /etc/passwd file are not able to alter corrupted or duplicated entries. pwck should be used in those
circumstances to remove the offending entry.
OPTIONS
The options which apply to the pwck command are:
-q
Report errors only. The warnings which do not require any action from the user won't be displayed.
-r
Execute the pwck command in read-only mode.
-s
Sort entries in /etc/passwd and /etc/shadow by UID.
By default, pwck operates on the files /etc/passwd and /etc/shadow. The user may select alternate files with the passwd and shadow
parameters.
CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool:
PASS_MAX_DAYS (number)
The maximum number of days a password may be used. If the password is older than this, a password change will be forced. If not
specified, -1 will be assumed (which disables the restriction).
PASS_MIN_DAYS (number)
The minimum number of days allowed between password changes. Any password changes attempted sooner than this will be rejected. If not
specified, -1 will be assumed (which disables the restriction).
PASS_WARN_AGE (number)
The number of days warning given before a password expires. A zero means warning is given only upon the day of expiration, a negative
value means no warning is given. If not specified, no warning will be provided.
FILES
/etc/group
Group account information.
/etc/passwd
User account information.
/etc/shadow
Secure user account information.
EXIT VALUES
The pwck command exits with the following values:
0
success
1
invalid command syntax
2
one or more bad password entries
3
can't open password files
4
can't lock password files
5
can't update password files
6
can't sort password files
SEE ALSO
group(5), grpck(8), passwd(5), shadow(5), usermod(8).
System Management Commands 06/24/2011 PWCK(8)