09-04-2001
Fixed Line
The easiest to circumvent the password thingy to is to paste lines into the /etc/passwd with a fixed string for the password (using a known 'default' password). Then you run a passwd -f afterwards for the user that he/she is forced to change password at first login.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
ftp -n -v <<EOF
verbose
open 3.57.40.79
user infodvlp pr0gram
ascii
lcd /home/a501420038/GLA/Success_Load/
cd /ftp/SrcFiles/csg/InstruAsia/
get AU_Success_Log.txt
close
quit
EOF
Please help on this, this gives the out put "AU_Success_Log.txt?" As question mark in the last what will... (1 Reply)
Discussion started by: a501420038
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I am writing somescripts to shut down some services in Korn Shell. Some of the services are under different owners. For example when I want to shutdown NXserver I need to be "root", but when I shut down the webserver I need to be under a different user.
Manual I would use "su root" and... (1 Reply)
Discussion started by: bonekrusher
1 Replies
3. OS X (Apple)
Hello everyone,
Not sure if this is the right place, but OS X isn't your standard Unix, so I figured here would be best. I am looking at creating a script that will be interactive that admins can run to create users.
Now, 10.4 uses netinfo database and netinfo manager to handle it's users. ... (3 Replies)
Discussion started by: tlarkin
3 Replies
4. Shell Programming and Scripting
hi all
how to create and remove desktop icons or icons from shell scripts? (1 Reply)
Discussion started by: kkpal
1 Replies
5. Shell Programming and Scripting
Experts,
I am newbie in shell scripting. I want to write Bash shell scripts corresponding to windows bat files. I have installed cygwin at c:\cygwin and i am trying to crate the sh file using vi editor. i am not able to understand how to use linux/unix convention for the code. following is my... (1 Reply)
Discussion started by: rajuchacha007
1 Replies
6. UNIX for Dummies Questions & Answers
I am looking to do something where if I created a file named backup,or whatever it would print a name like “backup_Apr_11_2011”. Thanks citizencro (1 Reply)
Discussion started by: citizencro
1 Replies
7. UNIX for Dummies Questions & Answers
I am trying to show the number of dead accts or false shells running and include a count at the end. Does anyone know how to go about this? Thanks - citizencro (3 Replies)
Discussion started by: citizencro
3 Replies
8. Shell Programming and Scripting
Hi friends you can solve my question about make 3 shell scripts?
Thanks for all! (1 Reply)
Discussion started by: dakota
1 Replies
9. Shell Programming and Scripting
hi,
i am new to shell scripts
i write a shell script to create multiple users but i need to give passwords to that users while creating users, command to write this script (1 Reply)
Discussion started by: DONFOX
1 Replies
10. Shell Programming and Scripting
This is a script to filter the users out of etc/passwd and etc/group. So if you want to migrate of restore a server you can use this script from a backup to restore and make the same users on you had..
Please feedback and comments.
#!/bin/bash
prompt_list () {
# haal uit de argumenten de... (5 Replies)
Discussion started by: dannyvdberg
5 Replies
SHADOW(5) File Formats Manual SHADOW(5)
NAME
shadow - encrypted password file
DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is
Login name
Encrypted password
Days since Jan 1, 1970 that password was last changed
Days before password may be changed
Days after which password must be changed
Days before password is to expire that user is warned
Days after password expires that account is disabled
Days since Jan 1, 1970 that account is disabled
A reserved field
The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru
Z, 0 thru 9, . and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES)
algorithm. For example if it starts with "$1$" it means the MD5-based algorithm was used.
Refer to crypt(3) for details on how this string is interpreted.
The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the
proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater
than the maximum number of day allowed, this password may not be changed by the user.
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass-
word expires. An account will also be disabled on the specified day regardless of other password expiration information.
This information supercedes any password or password age information present in /etc/passwd.
This file must not be readable by regular users if password security is to be maintained.
FILES
/etc/passwd - user account information
/etc/shadow - encrypted user passwords
SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8)
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
SHADOW(5)