Sponsored Content
Top Forums UNIX for Dummies Questions & Answers not taking password for su on mac os x Post 36864 by zitz on Friday 6th of June 2003 12:05:47 AM
Old 06-06-2003
Ok, please be kind. I already know I am a newbie...

I have to login as a superuser to install this program like I said before. Now that I can login as root, I need to make myself a superuser. I never use shells on my mac and have never logged in as root before. Do I need to enable something? Create something?

When I login as root it says:

tcsh: Cannot open /etc/termcap.
tcsh: using dumb terminal settings.

When I try su it says:

_su: Cannot open /etc/termcap.
_su: using dumb terminal settings.

So how do I make create a superuser account?

Z
 

5 More Discussions You Might Find Interesting

1. OS X (Apple)

Mac OS X Tiger Password Storage

Are Mac OS X 10.4.11 Tiger passwords only stored in /var/db/shadow/hash? Or is it also used in NetInfo? The reason I am asking is because I wonder if I edit the file in /var/db/shadow/hash and replace the hash inside with my own, will it change the password? Thanks. (0 Replies)
Discussion started by: Ricardo-san
0 Replies

2. Shell Programming and Scripting

Execute via crontab taking username/password from file

Dear All Here is the details what i want to achieve from shell scripts I have a sever where 5 databases are created. which i having diffrent SID's. Now i want to execute some SQL queries on each one of the databases. (SQL Query is same).That i want to acheive via crontab Now each one of the... (2 Replies)
Discussion started by: jhon
2 Replies

3. UNIX for Dummies Questions & Answers

Mac OS X Password

I want to know the exact process of how Mac OS X takes a string(password) and encrypts it. I know the encrypted file is stored in /var/db/shadow/hash/<GUID> But.. 1) How does the string get to that point? 2) How can I write a script that can do this so i can encrypt my password, compare it... (0 Replies)
Discussion started by: cbreiny
0 Replies

4. Shell Programming and Scripting

Logging in unix account taking password from a parameter file

Hi All, I am writing a script where it updates a file in an unix account. To update that file i need to be logged in as that account user. say account name is ab01 and its password is passab01. What i want to do is, my script should read login id and password from a parameter file and... (4 Replies)
Discussion started by: pkbond
4 Replies

5. Shell Programming and Scripting

Taking mirror copy of the application id and password into the new UNIX machine

I am working in Datastage Migration project. The applications has to be moved from legacy machines to the new machines. all the applications will be having their own application id and password (non expiry) created in the unix (5.3). Now the scripts and the datastage applications has to be moved... (1 Reply)
Discussion started by: kmanivan82
1 Replies
MAC_SEEOTHERUIDS(4)					   BSD Kernel Interfaces Manual 				       MAC_SEEOTHERUIDS(4)

NAME
mac_seeotheruids -- simple policy controlling whether users see other users SYNOPSIS
To compile the policy into your kernel, place the following lines in your kernel configuration file: options MAC options MAC_SEEOTHERUIDS Alternately, to load the module at boot time, place the following line in your kernel configuration file: options MAC and in loader.conf(5): mac_seeotheruids_load="YES" DESCRIPTION
The mac_seeotheruids policy module, when enabled, denies users to see processes or sockets owned by other users. To enable mac_seeotheruids, set the sysctl OID security.mac.seeotheruids.enabled to 1. To permit superuser awareness of other credentials by virtue of privilege, set the sysctl OID security.mac.seeotheruids.suser_privileged to 1. To allow users to see processes and sockets owned by the same primary group, set the sysctl OID security.mac.seeotheruids.primarygroup_enabled to 1. To allow processes with a specific group ID to be exempt from the policy, set the sysctl OID security.mac.seeotheruids.specificgid_enabled to 1, and security.mac.seeotheruids.specificgid to the group ID to be exempted. Label Format No labels are defined for mac_seeotheruids. SEE ALSO
mac(4), mac_biba(4), mac_bsdextended(4), mac_ifoff(4), mac_lomac(4), mac_mls(4), mac_none(4), mac_partition(4), mac_portacl(4), mac_test(4), mac(9) HISTORY
The mac_seeotheruids policy module first appeared in FreeBSD 5.0 and was developed by the TrustedBSD Project. AUTHORS
This software was contributed to the FreeBSD Project by Network Associates Labs, the Security Research Division of Network Associates Inc. under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the DARPA CHATS research program. BUGS
See mac(9) concerning appropriateness for production use. The TrustedBSD MAC Framework is considered experimental in FreeBSD. While the MAC Framework design is intended to support the containment of the root user, not all attack channels are currently protected by entry point checks. As such, MAC Framework policies should not be relied on, in isolation, to protect against a malicious privileged user. BSD
October 6, 2005 BSD
All times are GMT -4. The time now is 02:12 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy