10-29-2003
hi,
well yes u can actually telnet to the unix easily but u cant run any GUI it will give access to login .
regards
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi everyone,
I'm planning on installing Linux Redhat on my system, what are the steps i need to take in order to install it side by side with Win'98 or Win'Me OS. (1 Reply)
Discussion started by: Chaos
1 Replies
2. UNIX for Dummies Questions & Answers
Ok here is my problem i do not know the command to load a driver for my network card in Ted hat linux 6.0 could sombody give me a hand. and if there is anyone that has a list of commands for red hat that would be great also (2 Replies)
Discussion started by: bbutler3295
2 Replies
3. UNIX for Dummies Questions & Answers
I want to know because am very interested in learning the basics or even the whole thing if it isn't too complicated.
if it doesn't come with linux red hat, then, where can I get rich information about it?? (1 Reply)
Discussion started by: TRUEST
1 Replies
4. UNIX for Dummies Questions & Answers
Hello guys, I got overzealous (I Think).
I got the book Linux Unleashed that comes with the Slackware 3.0 Version of Linux for $2.00.I also have Red Hat Linux 7.2 (No book, just the OS).What I wanted to know was,other than the bells and whistles of Red Hat is there any significant difference... (2 Replies)
Discussion started by: perrylx
2 Replies
5. Linux
Hello there!
Will anybody please tell me some good links to online eBooks on Red Hat Linux 9 user experiences and the like. If the books are in PDF Format, it will be nice to read.
Thanks for cooperation in advance.
Enjoy using open source and breathe freely!
JAM (5 Replies)
Discussion started by: Jawwad
5 Replies
6. Red Hat
Hi all
I have an old Compaq DL380 (G1) server with 4 hard disks. It is running Red Hat Linux 7.2
One of the disks died. I didn't build the box myself. How would I determine if software RAID was configured? I had a look a /etc/fstab, but it's only referring to ida/c0d0
The... (3 Replies)
Discussion started by: soliberus
3 Replies
7. Linux
Hi,
I have got a very simple, but unresolved problem. I am trying to login in Red Hat Linux here. However the login shell is mentioned as csh in /etc/passwd file. I am unable to make out which file is executed on login - .bash_profile ? There is no file like .bash_login or .bash_tshrc.... (3 Replies)
Discussion started by: asutoshch
3 Replies
8. Red Hat
The Adobe Flash Player does not work in my Enterprise Red Hat Linux.
It instructs me to download the Flash Player which I have done. However, it does not install. Do I have a GUI in Red Hat that I can use or do I have to do it via command line.
Would appreciate any help.
Thanks,
Anil (3 Replies)
Discussion started by: AnilAnand
3 Replies
9. UNIX for Dummies Questions & Answers
how to know if i use "Red Hat Enterprise Linux" or "Red Hat Desktop" ? (2 Replies)
Discussion started by: ahmedamer12
2 Replies
10. Fedora
I just started a new semester and I started my UNIX class yesterday. I've already decided to use python along with my learning process but what I really want to use with it is Kali as my UNIX/Linux platform to learn off of since I already wanted to learn Cyber Sec. anyways. I just wanted to know if... (12 Replies)
Discussion started by: ApacheOmega
12 Replies
LEARN ABOUT NETBSD
login.access
LOGIN.ACCESS(5) BSD File Formats Manual LOGIN.ACCESS(5)
NAME
login.access -- login access control table
DESCRIPTION
The login.access file specifies (user, host) combinations and/or (user, tty) combinations for which a login will be either accepted or
refused.
When someone logs in, the login.access is scanned for the first entry that matches the (user, host) combination, or, in case of non-networked
logins, the first entry that matches the (user, tty) combination. The permissions field of that table entry determines whether the login
will be accepted or refused.
Each line of the login access control table has three fields separated by a ':' character: permission:users:origins
The first field should be a "+" (access granted) or "-" (access denied) character. The second field should be a list of one or more login
names, group names, or ALL (always matches). The third field should be a list of one or more tty names (for non-networked logins), host
names, domain names (begin with "."), host addresses, internet network numbers (end with "."), ALL (always matches) or LOCAL (matches any
string that does not contain a "." character). If you run NIS you can use @netgroupname in host or user patterns.
The EXCEPT operator makes it possible to write very compact rules.
The group file is searched only when a name does not match that of the logged-in user. Only groups are matched in which users are explicitly
listed: the program does not look at a user's primary group id value.
FILES
/etc/login.access The login.access file resides in /etc.
SEE ALSO
login(1), pam(8)
AUTHORS
Guido van Rooij
BSD
April 30, 1994 BSD