Sponsored Content
Top Forums Programming User name and password encryption Post 67526 by MxO_online on Wednesday 23rd of March 2005 05:55:39 PM
Old 03-23-2005
option 2 is out cuz if you can do it who is to say a "hacker" cant.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Zipping with password or encryption

We currently take files (via FTP) off of a mainframe and save them as a text file on our server. This is done via a script. The next thing that is done to that text file is it gets zipped (using ZIP). This all works fine, but it doesn't appear that ZIP (the free version) has any way to password... (2 Replies)
Discussion started by: dsimpg1
2 Replies

2. UNIX for Dummies Questions & Answers

Password safe encryption strength

I'm not sure if this is the right forum for this or not but we use a program called "Password Safe" to store the many root passwords we have for our Unix system. Now we are being called out by our security team to prove that this is a safe program to use. So far I have been able to determine... (1 Reply)
Discussion started by: keelba
1 Replies

3. Solaris

Password Encryption (SunOS 5.8)

Hi all, I have a server in the office that we connect to via telnet. Can anyone explain please how i can encrypt the password so it cannot be picked up in plain text by sniffing software like WireShark, etc.? I'm not very experienced in Unix, so any ideas or even links would be great. ... (5 Replies)
Discussion started by: de049
5 Replies

4. Solaris

Password encryption in script

:DHi i am preparing a script to connect to oracle from solaris.... now i want that no one is able to see the password in the script. is it possible...please help Regards Ankurk (3 Replies)
Discussion started by: ankurk
3 Replies

5. UNIX for Dummies Questions & Answers

Password encryption

In unix, i know the password encrypt by using salt But how does it work? And how windows protect its password? Thank you for helping in advance (5 Replies)
Discussion started by: cryogen
5 Replies

6. Shell Programming and Scripting

Password encryption...

Hi, I have a Java app that looks for some parameters in a .properties file such as username and password. However I don't want to leave the password in a text file and I can't modify the app... Does anyone have some idea about how to encrypt/hide/etc the password so it's not freely accessible... (1 Reply)
Discussion started by: Tr0cken
1 Replies

7. Shell Programming and Scripting

Password Encryption for Oracle Script

Please let me know the how to hide Oracle credential in below script: PP.AIX.ETL:/XYZ/abc/dsclientprod/home/scripts/monthly > cat exec_sql.sh set +x # import our environment #. /xyz/abc/dsclientprod/home/my.env ScriptOutput=/QIS2FTP/HP_ST_UAT/dsclientprod/home/scripts/ScriptRunInfo.txt... (2 Replies)
Discussion started by: rajubollas
2 Replies

8. Cybersecurity

Password encryption - migration user accounts from SuSe to RedHat

Hello guys, I'm currently working on replacing old server and it's migration from SuSe SUSE Linux Enterprise Server 10 (x86_64) VERSION = 10 PATCHLEVEL = 4 to the RedHat Red Hat Enterprise Linux Server release 6.4 (Santiago) Problem seems be in migration of users passwords,... (2 Replies)
Discussion started by: brusell
2 Replies

9. UNIX for Dummies Questions & Answers

Password encryption

if I change my password on two different servers, using the same string but the encrypted password in /etc/passwd look different. If I copy an entry from one /etc/password to the other server. I can still log in to both servers using the same password. Only now both /etc/passwd entries are... (2 Replies)
Discussion started by: C0ppert0p
2 Replies

10. Shell Programming and Scripting

Password encryption in RHEL

I am working on a script where we are using sqlplus command to connect to Oracle DB. But the schemaname and password used for sqlplus authentication, have to be hardcoded in the script. DBconnection=scott/tiger@SID sqlplus $DBconnection Here any user who reads the script can read the... (1 Reply)
Discussion started by: max29583
1 Replies
SYMLINKS(8)						      System Manager's Manual						       SYMLINKS(8)

NAME
symlinks - symbolic link maintenance utility SYNOPSIS
symlinks [ -cdorstv ] dirlist DESCRIPTION
symlinks is a useful utility for maintainers of FTP sites, CDROMs, and Linux software distributions. It scans directories for symbolic links and lists them on stdout, often revealing flaws in the filesystem tree. Each link is output with a classification of relative, absolute, dangling, messy, lengthy, or other_fs. relative links are those expressed as paths relative to the directory in which the links reside, usually independent of the mount point of the filesystem. absolute links are those given as an absolute path from the root directory as indicated by a leading slash (/). dangling links are those for which the target of the link does not currently exist. This commonly occurs for absolute links when a filesystem is mounted at other than its customary mount point (such as when the normal root filesystem is mounted at /mnt after booting from alternative media). messy links are links which contain unnecessary slashes or dots in the path. These are cleaned up as well when -c is specified. lengthy links are links which use "../" more than necessary in the path (eg. /bin/vi -> ../bin/vim) These are only detected when -s is specified, and are only cleaned up when -c is also specified. other_fs are those links whose target currently resides on a different filesystem from where symlinks was run (most useful with -r ). OPTIONS
-c convert absolute links (within the same filesystem) to relative links. This permits links to maintain their validity regardless of the mount point used for the filesystem -- a desirable setup in most cases. This option also causes any messy links to be cleaned up, and, if -s was also specified, then lengthy links are also shortened. Links affected by -c are prefixed with changed in the output. -d causes dangling links to be removed. -o fix links on other filesystems encountered while recursing. Normally, other filesystems encountered are not modified by symlinks. -r recursively operate on subdirectories within the same filesystem. -s causes lengthy links to be detected. -t is used to test for what symlinks would do if -c were specified, but without really changing anything. -v show all symbolic links. By default, relative links are not shown unless -v is specified. BUGS
symlinks does not recurse or change links across filesystems. AUTHOR
symlinks has been written by Mark Lord <mlord@pobox.com>, the original developer and maintainer of the IDE Performance Package for linux, the Linux IDE Driver subsystem, hdparm, and a current day libata hacker. SEE ALSO
symlink(2) Version 1.4 October 2008 SYMLINKS(8)
All times are GMT -4. The time now is 02:38 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy