02-20-2019
Quote:
Originally Posted by
bakunin
Well, challenge him then: if he is not able to find a solution for the problem of separating his environment from the system environment
and still get his environment for his own sessions then he is not gods own gift but simply
less accomplished to put it in gentle terms. The ancient greeks (sometimes it pays to have endured four years of ancient greek and 6 years of latin in school) had a word for "layman", "private citizen" (as opposed to "office holder") or, generally, "unskilled [one]".
You may want to look it up eventually. ;-))
bakunin
Ha, well I actually just told him I was going to change it back, and he just shrugged and let it go. Which is funny because when I talked to him about it the other day he was pretty adamant about leaving it. Anyway, I really didn't want to jump through a bunch of hoops to accomplish it, so it works out that he just let it go.
The funny thing is, he's really not unskilled, he's pretty good at his job, problem is he knows it, and is very condescending and just very short with everyone. Thanks for the suggestions everyone, wish I could say I used them to come up with a cool solution, when really I just needed to deal with the human aspect. :-)
10 More Discussions You Might Find Interesting
1. Linux
Hi all..
I'm secering a RH 2.1 server, with gnome (not my choice...), as X manager.
Is ther anyway to get sudo ask for root password other then the actual user's password? Like when you launch the graphical IHM to create a new user, it asks for root's password? Is there a way to do the same... (5 Replies)
Discussion started by: penguin-friend
5 Replies
2. AIX
Guy's
I'm trying to add some lines in sudo by useing this command visudo
# User privilege specification
root ALL=(ALL) ALL
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL
# Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL
#... (5 Replies)
Discussion started by: ITHelper
5 Replies
3. UNIX for Dummies Questions & Answers
I'm actually working with a Ubuntu-System here and have a question about executing a command with 'sudo'.
I tried and got a error message like "not allowed".
After this I logged in with 'sudo -s' and typed the command without 'sudo'. This worked well.
Can please somebody explain me this... (0 Replies)
Discussion started by: daWonderer
0 Replies
4. UNIX for Dummies Questions & Answers
I've been through many threads before i decide to create a separate thread.
I can't really find the solution to my (simple) problem.
Here's what I'm trying to achieve:
As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user.
The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies
5. UNIX for Dummies Questions & Answers
Anyone able to explain why if i run "sudo -i" or "sudo -s" i am able to get into root by just keying my own password?
How to avoid this from happening coz i need all the users to use su - only. (2 Replies)
Discussion started by: timmywong
2 Replies
6. UNIX for Dummies Questions & Answers
Hi All,
I need to give an user sudo ability to root.
We have also generated RSA key but unable to proceed further.
For example after a user logs into the server normally and when he executes below command
$ssh root@server_name
This should take you to root prompt #
Please help me.... (3 Replies)
Discussion started by: Rockyc3400
3 Replies
7. Cybersecurity
My friend has found a bug with sudo.
His organization has Linux laptops with no root access to users. Policy pushing is through Puppet.
But doing sudo sudo twice he is able to access root.
Do you guys have any clue, how's that possible, usually sudo su is restricted. (8 Replies)
Discussion started by: nixhead
8 Replies
8. Red Hat
I have a set of RHEL 5 boxes running our ERP software on Oracle databases. I need to allow my DBA's to su to oracle and one other account (banner) without knowing the oracle or banner password. But I need to prevent them from su'ing to any other user especially root. I only want them to be able to... (1 Reply)
Discussion started by: westmoreland
1 Replies
9. UNIX for Beginners Questions & Answers
i have tried to use a sudo command from a user level . but instead of asking for user password it asked for root password . how should i go about it .
james@opensuse:/etc> sudo ifconfig
root's password:
And i wish to ask how should i allow a list of command to be allowed to used for a... (4 Replies)
Discussion started by: lobsang
4 Replies
10. Solaris
Hello,
It is Solaris-10. There is a file as /opt/vpp/dom1.2/pdd/today_23. It is always generated by root, so owned by root only.
This file has to be deleted as part of application restart always and that is done by app_user and SA is always involved to do rm on that file.
Is it possible to give... (9 Replies)
Discussion started by: solaris_1977
9 Replies
LEARN ABOUT DEBIAN
polygraph-aka
POLYGRAPH-AKA(1) User Commands POLYGRAPH-AKA(1)
NAME
polygraph-aka - IP aliases manipulation tool
SYNOPSIS
aka [--option ...] [interface_name] [alias] ...
DESCRIPTION
Aka is used to setup large number of aliases during Polygraph experiments with many robots and servers.
The aliases option specifies what alias or aliases you want to have on the given interface. Aka recognizes IP addresses in PGL address for-
mat, including dotted IP range. Aka will try to guess the subnet or you can use an explicit subnet specification.
The number of aliases you can set depends on your OS. Moreover, some OSes may support large number of aliases (more than 1000) but with a
significant performance penalty.
Note that you can just put alias specs after all other options and the interface name (see aka's usage line).
Aka will delete all old aliases before setting new ones. If you do not specify the new aliases, the old ones will still be deleted (handy
for cleaning up after yourself).
OPTIONS
--help list of options
--version
package version info
--if <str>
interface name
--aliases <str>
ip(s) or ip range(s) to set as aliases
COPYRIGHT
Copyright (C) 2003-2006 The Measurement Factory, Inc.
SEE ALSO
polygraph(7) - general information and a list of programs
http://www.web-polygraph.org/ - project web site
polygraph-aka - Web Polygraph February 2010 POLYGRAPH-AKA(1)