08-28-2001
Thanks. Actually one of my user's UID was messed up. I deleted the user and then added her. Everything works fine now.
VJ
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I want to UNTAR a TAR file at different location. Is it possible?
My TAR file contains the files with absolute path.
Malay (5 Replies)
Discussion started by: malaymaru
5 Replies
2. UNIX for Advanced & Expert Users
Hi All
Can someone pls guide me if there any utility to compress file on windows & uncompress on vxworks
I tried as -
- compressed some folders on windows ... i created .tar ( to maintain directory structure ) and compressed to .gz format.
- on VxWorks i have uncompressed it to .tar... (1 Reply)
Discussion started by: uday_01
1 Replies
3. Shell Programming and Scripting
I am trying to put together a script that will check for the latest file in a directory then extract it. The extraction and the scheduling I can do, but am not sure how to get it to check for the latest file.
These files are uploaded every evening by an external party and the previous days files... (3 Replies)
Discussion started by: stheologo
3 Replies
4. UNIX for Dummies Questions & Answers
I have a script to ftp, archive and delete files. I used tar command to archive files from a list and then all files were removed from name1/name2/name2/.
find /name1/name2/name2/ -name "*.txt" -print > filelist.log
while read line
do
if ; then
tar cvf $tarfile $line
else
... (3 Replies)
Discussion started by: Lenora2009
3 Replies
5. UNIX for Dummies Questions & Answers
how can I untar a file without extracting it?
sample: file.tar to file
thanks,
lara (1 Reply)
Discussion started by: lhareigh890
1 Replies
6. UNIX for Advanced & Expert Users
Hi,
i want tar the files from one location and untar it to other location using single line.
Can any one help me
zip and unzip using single line command. (2 Replies)
Discussion started by: venikathir
2 Replies
7. Red Hat
I use red hat linux.
I have two linux server .
I want to use tar over ssh to tar and untar the file.
The server A , have IP 10.1.1.a ,there is dir a and contain files.
The server B have IP 10.1.1.b , there is dir b and contain file .
So, in above case ,how can I tar over ssh sunc that the file... (0 Replies)
Discussion started by: chuikingman
0 Replies
8. Shell Programming and Scripting
Hi Guys,
I am facing a strange issue
while doing parallel (using & for background) scp/untar operation from my unix box to multiple unix boxes...
I am getting
tar : unexpected EOF in archive error
the code is as follows.,,,
for i in 10
do
sh -c "scp <command> ; ssh tar -xf <tar> -C... (4 Replies)
Discussion started by: mihirvora16
4 Replies
9. UNIX for Dummies Questions & Answers
Hi Guys,
I am able to untar a tar.gz file. But it is again extracting the tar file to further child directory.
I even tried the below command to untar it to particular directory.
tar -zxvf gme_dly_sls_20120515035335.txt.tar.gz -C /sites/VSTAR/site/live/ftp/GMEUROPE
I am getting the below... (4 Replies)
Discussion started by: mac4rfree
4 Replies
10. Shell Programming and Scripting
I have a tar file hello.tar which is 95 GB.
hello.tar has many files and folders including some tar files as well.
I wish to create a new tar ball which should maintain only the folder structure of hello.tar and the tar ball within the hello.tar
So basically the idea is to untar... (2 Replies)
Discussion started by: mohtashims
2 Replies
LEARN ABOUT ULTRIX
setauth
getauth(8) System Manager's Manual getauth(8)
Name
getauth, setauth, rmauth - auth database maintenance
Syntax
getauth [username]
setauth
rmauth username
Description
The command takes as it's only argument a user name or UID. If a user name is supplied it is converted to a UID by searching through The
UID is then used to look up the users entry in the database. If an entry is found it is converted to an ASCII string with a syntax resem-
bling that of the passwd file and printed out as a single line. If no entry is found nothing is printed and an exit status of `1' is
returned.
# getauth username
1000:idvidfy8d:1920129:3600:2678400:0e:0:1000:0:00:00
The first field is the UID of the entry which is used as the key into the database. Then follows: the encrypted password, password modifi-
cation time, minimum password lifetime, maximum password lifetime, account mask, login failure count, audit ID, audit control, audit mask,
and a reserved field.
If the optional username argument is not supplied to getauth it will produce an output line for every entry in the auth database.
The command expects one or more lines from the standard input which must be of a form identical to that produced by the command. The com-
mand converts and stores these lines into the database, one entry per line, replacing any entry already existing for the given UID. By
piping the output of the command into the input of the command an expensive NOP can be produced:
# /usr/etc/sec/getauth | /usr/etc/sec/setauth
The command expects exactly one argument, the user name or UID of an auth entry to be deleted. If the entry is found it is erased and
deleted. If it is not found no action is taken and an exit status of 1 is returned.
Restrictions
Only the superuser and members of the group may read information from the auth database. Only the superuser may modify the auth database.
Diagnostics
An exit value of 0 indicates a successful operation. An exit status of 1 indicates the entry was not found on a lookup or deletion opera-
tion. Any other exit status indicates an error.
Files
See Also
getauthuid(3), getpwent(3), auth(5), edauth(8)
Security Guide for Administrators
getauth(8)