11-17-2004
Hi,
Thank you for your reply.
If I may not be wrong, I have fail you to understand. What i want is that how I will reboot the sco without root password. I did not forget the root password. For the security reason I will allow other user to reboot for some reasons.
Thanks,
Mostafizur Rahman
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I want to get an email alert from a cronjob when a server got rebooted unexpectedly. Please help. Thanks! :confused: (2 Replies)
Discussion started by: angloi
2 Replies
2. UNIX for Advanced & Expert Users
hi all, :)
for a reboot of sun box for patch installation i would like to know where do the reboot logs apart from /var/adm/messages and patch run messages would be available,
i would like to know the sequence of messages logged in the file like
requesting the users to log out
sending a... (1 Reply)
Discussion started by: matrixmadhan
1 Replies
3. AIX
I've recently changed my gateway setting using SMIT. Everything went fine except that the gateway setting kept reverting back to the old one everytime I reboot the server.
I'm on AIX 5.2 running p-Series. Thanks for any info. (3 Replies)
Discussion started by: dereklow
3 Replies
4. Solaris
Hi All,
I want to know the procedure like if server is down, i want to reboot the server through console ($rsc or $sc prompt).Could you please help me out.
I would really appreciate your cooperation.
thanks for understanding
regards
krishna (5 Replies)
Discussion started by: murthy76
5 Replies
5. SCO
Hello,
How do a schedule a reboot of a SCO 5.0 box like every wednesday at 3:30 am. Doesn't have a /etc/crontab file like our Suse boxes have. Thanks for any help. (6 Replies)
Discussion started by: benefactr
6 Replies
6. SCO
Hi,
We are using SCO UNIX 7.1.3 and the server recently started rebooting by itself.
Do anyone know how can i create a dump or crash dump while the server rebooots?
Your quick help on this is really appreciated.
Regards,
Ravikumar R (1 Reply)
Discussion started by: rrb2009
1 Replies
7. Linux
We reboot our linux servers daily. Is it needed ? (10 Replies)
Discussion started by: linuxadmin
10 Replies
8. Solaris
Hi,
anyone please let us know how to write shell script to find the missing mountpoints after server reboot.
i want to take the mountpount information before server reboot, and validate the mountpoints after server reboot if any missing.please let us know the shell script from begining to end as... (24 Replies)
Discussion started by: VenkatReddy786
24 Replies
9. Red Hat
Hi,
The server got rebooted and below messages can be seen in /var/log/messages
Sep 7 10:49:12 minersville kernel: Call Trace: <IRQ> <ffffffff80167420>{__alloc_pages+796}
Sep 7 10:49:12 minersville kernel: <ffffffff80182814>{kmem_getpages+106} <ffffffff80183c16>{fallback_alloc+304}... (3 Replies)
Discussion started by: admin_db
3 Replies
LEARN ABOUT OSF1
secsetup
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)