02-16-2005
their criteria?
im not sure if i know what your asking but ill try to explain what im building..
when the etc/passwd is copied i got a list of users say...
rmamkfda
ajkfdasj;f
akfjalkjas
ajfa;jaaa
wuiewpur
when i output who to a file lets say i get....
rmamkfda
ajkfdasj;f
akfjalkjas
oiurwpqur
wuiewpur
So i know now that oiurwpqur does not belong, that is pretty much the gist but there is much more I have to do with the passwords, i just can't past the part where I compare names, no passwords are needed yet
Thanks a lot for you help and I hope this helps.
As im reading more on join, i think this will actually give me hte similarity between the two files, but could this be considered to big, let me read man largefile and answer my own question
![Smilie Smilie](https://www.unix.com/images/smilies/smile.gif)
thanks
Last edited by Bosibus; 02-16-2005 at 03:27 PM..
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
hi,
i have to check the name of file in other directory which contains number of files to check for duplicte file name avaliable or not.
thanks (2 Replies)
Discussion started by: ravi214u
2 Replies
2. Shell Programming and Scripting
Dear Members,
I need a perl code:
1. Which will open first file with two columns separated by tab:
37 Distribution and seasonal variation of trace metals
85 Seasonal variability of the mixed layer in the central Bay
99 Dynamics of transparent exopolymeric particles (TEP)
103 Bacterial... (0 Replies)
Discussion started by: srsahu75
0 Replies
3. Shell Programming and Scripting
Help needed...
Can you tell me how to compare the last two couple entries in a file and print their result in new file..:confused:
I have one file
Check1.txt
\abc1 12345
\abc2 12327
\abc1 12345
\abc2 12330
I want to compare the entries in Check1 and write to... (1 Reply)
Discussion started by: kichu
1 Replies
4. Shell Programming and Scripting
Hi,
I have two files with below data::
file1:-
123|aaa|ppp
445|fff|yyy
999|ttt|jjj
555|hhh|hhh
file2:-
445|fff|yyy
555|hhh|hhh
The records present in file1, not present in file 2 should be writtent to the out put file.
output:-
123|aaa|ppp
999|ttt|jjj
Is there any one line... (3 Replies)
Discussion started by: gani_85
3 Replies
5. UNIX for Dummies Questions & Answers
Hi
We send *.csv with sensitive data to our customers. Our customers open those files with Excel.
A new requirement is that we password protect those CSV files.
I thought to pack them with ZIP and assign a password to the archive.
But Solaris 10 can't encrypt ZIP files.
$ zip -P... (12 Replies)
Discussion started by: slashdotweenie
12 Replies
6. Shell Programming and Scripting
Hi all,
I have one file with IDs
Q8NDM7
P0C1S8
Q8TF30
Q9BRP8
O00258
Q6AWC2
Q9ULE0
Q702N8
A4UGR9
Q13426
Q6P2D8
Q9ULM3
A8MXQ7
I want to compare ID file with another file which has complete information about these IDs and also about other IDs which are not in the above ID file. As... (10 Replies)
Discussion started by: kaav06
10 Replies
7. Shell Programming and Scripting
Hello all,
I need to write a script which has following requirement:
Need to read the filenames from text file and then search for the above read files in the required directory and if match found backup them in a backup folder.
And also need to compare and verify whether the files in the... (7 Replies)
Discussion started by: saurau
7 Replies
8. Shell Programming and Scripting
Hi,
I need to compare a file with its contents matching to that of another file(filename , received date and record count).
Lets say has File A original data
Ex -
1,abc,1234
2,bcd,4567
3,cde,8901
and File B has details of File A
Ex-
FILEA.TXT|06/17|2010|3
(filename)|(received... (18 Replies)
Discussion started by: Prashanth B
18 Replies
9. UNIX for Dummies Questions & Answers
Hi
I have 2 files which are tab delimited.
file1
chr1 5 10 P1 KR4
chr1 10 20 1H LA1 R0 TA1
file2
P1 G6 13.27 0.2425
P1 KR4 18.79 0.3060
P1 DND1 19.44 0.2833
N1 DH1 0.99 1.08
1H R0 0.9 NA
LA1 R0 90 0.9
TA1 KR4 1.8 8.9
TA1 R0 9.7 99I want to check whether first 2 columns in file2 (column... (1 Reply)
Discussion started by: raj_k
1 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT DEBIAN
chpasswd
CHPASSWD(8) System Management Commands CHPASSWD(8)
NAME
chpasswd - update passwords in batch mode
SYNOPSIS
chpasswd [options]
DESCRIPTION
The chpasswd command reads a list of user name and password pairs from standard input and uses this information to update a group of
existing users. Each line is of the format:
user_name:password
By default the passwords must be supplied in clear-text, and are encrypted by chpasswd. Also the password age will be updated, if present.
By default, passwords are encrypted by PAM, but (even if not recommended) you can select a different encryption method with the -e, -m, or
-c options.
Except when PAM is used to encrypt the passwords, chpasswd first updates all the passwords in memory, and then commits all the changes to
disk if no errors occured for any user.
When PAM is used to encrypt the passwords (and update the passwords in the system database) then if a password cannot be updated chpasswd
continues updating the passwords of the next users, and will return an error code on exit.
This command is intended to be used in a large system environment where many accounts are created at a single time.
OPTIONS
The options which apply to the chpasswd command are:
-c, --crypt-method METHOD
Use the specified method to encrypt the passwords.
The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods.
By default, PAM is used to encrypt the passwords.
-e, --encrypted
Supplied passwords are in encrypted form.
-h, --help
Display help message and exit.
-m, --md5
Use MD5 encryption instead of DES when the supplied passwords are not encrypted.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-s, --sha-rounds ROUNDS
Use the specified number of rounds to encrypt the passwords.
The value 0 means that the system will choose the default number of rounds for the crypt method (5000).
A minimal value of 1000 and a maximal value of 999,999,999 will be enforced.
You can only use this option with the SHA256 or SHA512 crypt method.
By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in /etc/login.defs.
CAVEATS
Remember to set permissions or umask to prevent readability of unencrypted files by other users.
CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool:
SHA_CRYPT_MIN_ROUNDS (number), SHA_CRYPT_MAX_ROUNDS (number)
When ENCRYPT_METHOD is set to SHA256 or SHA512, this defines the number of SHA rounds used by the encryption algorithm by default (when
the number of rounds is not specified on the command line).
With a lot of rounds, it is more difficult to brute forcing the password. But note also that more CPU resources will be needed to
authenticate users.
If not specified, the libc will choose the default number of rounds (5000).
The values must be inside the 1000-999,999,999 range.
If only one of the SHA_CRYPT_MIN_ROUNDS or SHA_CRYPT_MAX_ROUNDS values is set, then this value will be used.
If SHA_CRYPT_MIN_ROUNDS > SHA_CRYPT_MAX_ROUNDS, the highest value will be used.
Note: This only affect the generation of group passwords. The generation of user passwords is done by PAM and subject to the PAM
configuration. It is recommended to set this variable consistently with the PAM configuration.
FILES
/etc/passwd
User account information.
/etc/shadow
Secure user account information.
/etc/login.defs
Shadow password suite configuration.
/etc/pam.d/chpasswd
PAM configuration for chpasswd.
SEE ALSO
passwd(1), newusers(8), login.defs(5), useradd(8).
shadow-utils 4.1.5.1 05/25/2012 CHPASSWD(8)