04-02-2004
yip it is we all must have the same idea
any help would be appreciated though
unix is great but books and web serches are not much help
thanks pete
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
4. Write a program that will allow a user to input as many numbers as the user wants (use 999 as the choice that ends the user input). The program will then respond:
Highest Number: Answer
Lowest Number: Answer
Sum of the numbers: Answer
Average of the numbers: Answer
Can any1 help... (1 Reply)
Discussion started by: PoloRL185
1 Replies
2. Shell Programming and Scripting
Dear Bourne Shell Expert,
I am trying to change the current working directory from within a Bourne Shell script. Simply enough i thought !
As I am sure you are well aware, Inside the script i echo `pwd` and it seems ok, but the shell spawns another shell to execute this and as such, when my... (10 Replies)
Discussion started by: fawqati
10 Replies
3. UNIX for Dummies Questions & Answers
Hi guys !!
well i'm still new in learning UNIX , and actually i'm still studying it by myself ..
anyway, some people told me the Bourne-again shell is a good version of UNIX to work on , and i tried to download yesterday but i didn't know how to start it ...... the ReadMe file associated with... (3 Replies)
Discussion started by: mrsamer
3 Replies
4. Shell Programming and Scripting
Guys,
I am writing a script to delete files 5 min old in Sun Os Unix.
find . -name "*.txt" -mtime +1 -print
I could find an equivalent command to look for files which are 5 min old. i tried -mmin option it didn't work either.
Can any body trow a light on this.
Cheers :)
S:b: (5 Replies)
Discussion started by: sudharma
5 Replies
5. Shell Programming and Scripting
I do not claim to be an expert, but I have done things with scripts that whole teams of folks have said can not be done. Of course they should have said we do not have the intestinal fortitude to git-r-done.
I have been using UNIX actually HPUX since 1992. Unfortunately my old computer died and... (7 Replies)
Discussion started by: awk_sed_hello
7 Replies
6. Shell Programming and Scripting
Howdy People :),
I'm a newbie & its my first question here. I've started learning Unix Bourne Shell scripting recently and struggling already :p Can someone PLEASE help me with the following problem. Somehow my script is not working.
Display an initial prompt of the form:
Welcome to... (1 Reply)
Discussion started by: methopoth
1 Replies
7. Shell Programming and Scripting
Hi All
I have writing a Korn Shell script to execute it on many of our servers. But some servers don't have Korn Shell installed, they use Borne Shell.
Some operations like calculation don't work :
cat ${file1} | tail -$((${num1}-${num2})) > ${file2}
Is it possible to activate Korn Shell... (3 Replies)
Discussion started by: madmat
3 Replies
8. Shell Programming and Scripting
Exercise Five
Write a Bourne shell script which:
• Professionalism: plan for this from the start.
• Has one command line argument.
• If the command line argument is a directory then the script should output the number of
files in the directory.
• If the command line argument is an ordinary... (2 Replies)
Discussion started by: moesom
2 Replies
9. Shell Programming and Scripting
Could some one tell me the difference btw Bourne shell and the Kshell? Which is more flexible and reliable in terms of portability and efficiency. When i type the following command ..
$ echo $SHELL
yields me
/bin/sh
Does this tells me that I am in Bourne shell. If yes, how can i get... (6 Replies)
Discussion started by: bobby1015
6 Replies
10. Cybersecurity
A severe vulnerability was discovered in Bourne shell.
Just google for: bash vulnerability
... for more details. (5 Replies)
Discussion started by: Cochise
5 Replies
LOGIN(1) BSD General Commands Manual LOGIN(1)
NAME
login -- log into the computer
SYNOPSIS
login [-pq] [-h hostname] [user]
login -f [-lpq] [-h hostname] [user [prog [args...]]]
DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system.
If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of
users is configurable via pam(8). Password authentication is the default.
The following options are available:
-f When a user name is specified, this option indicates that proper authentication has already been done and that no password need be
requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves.
With the -f option, an alternate program (and any arguments) may be run instead of the user's default shell. The program and argu-
ments follows the user name.
-h Specify the host from which the connection was received. It is used by various daemons such as telnetd(8). This option may only be
used by the super-user.
-l Tells the program executed by login that this is not a login session (by convention, a login session is signalled to the program with
a hyphen as the first character of argv[0]; this option disables that), and prevents it from chdir(2)ing to the user's home direc-
tory. The default is to add the hyphen (this is a login session).
-p By default, login discards any previous environment. The -p option disables this behavior.
-q This forces quiet logins, as if a .hushlogin is present.
If the file /etc/nologin exists, login dislays its contents to the user and exits. This is used by shutdown(8) to prevent users from logging
in when the system is about to go down.
Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of
the day as well as other information. If the file .hushlogin exists in the user's home directory, all of these messages are suppressed. -q
is specified, all of these messages are suppressed. This is to simplify logins for non-human users, such as uucp(1). login then records an
entry in utmpx(5) and the like, and executes the user's command interpreter (or the program specified on the command line if -f is speci-
fied).
The login utility enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter
(SHELL), search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER).
Some shells may provide a builtin login command which is similar or identical to this utility. Consult the builtin(1) manual page.
The login utility will submit an audit record when login succeeds or fails. Failure to determine the current auditing state will result in
an error exit from login.
FILES
/etc/motd message-of-the-day
/etc/nologin disallows logins
/var/run/utmpx current logins
/var/mail/user system mailboxes
.hushlogin makes login quieter
/etc/pam.d/login pam(8) configuration file
/etc/security/audit_user
user flags for auditing
/etc/security/audit_control
global flags for auditing
SEE ALSO
builtin(1), chpass(1), newgrp(1), passwd(1), rlogin(1), getpass(3), utmpx(5), environ(7)
HISTORY
A login utility appeared in Version 6 AT&T UNIX.
BSD
September 13, 2006 BSD