04-10-2005
I agree. Why wouldn't you want to use find?
10 More Discussions You Might Find Interesting
1. Solaris
Hi,
I was wondering if there is any way to find out when the file/directory's permissions were changed. Typically, when using 'chmod' to change a file/directory's permissions, the modification date does not change.
Any help would be greatly appreciated.
Thanks. (4 Replies)
Discussion started by: kpatel
4 Replies
2. Shell Programming and Scripting
Hi,
I have a script called check.sh. I have to pass a file as input to this script. How can I validat whether the file has read permissions or not within the script.
Thanks in advance (1 Reply)
Discussion started by: sendhilmani123
1 Replies
3. Shell Programming and Scripting
Hi,
Is their a way to check the read and execute permission on a file on OTHERS and GROUP
rwxr--r-x
I am trying something like:
if ( || )
then
....
fi
The code above only checks the permissions of the owner of the file but not for the GROUP and OTHERS.
I will really... (5 Replies)
Discussion started by: rkumar28
5 Replies
4. Shell Programming and Scripting
I am running a linux centos server; our php script generates plenty of files in a directory, anything up to 1000 (though too often more).The files in these directories have permissions and ownerships which i need to change.
I have used shell comment for changing the file permission which is... (1 Reply)
Discussion started by: nilson
1 Replies
5. UNIX for Dummies Questions & Answers
Hi,
Is there any way to unzip a zip file and change file permissions to 777 while extracting the files. Does the file permissions on the zip file has to do anything with it(like zip read permissions only result in read uncompressed files etc.,)?
Thanks,
jp (2 Replies)
Discussion started by: jpk
2 Replies
6. UNIX for Advanced & Expert Users
Hi there,
I need to change all files/dirs
1. all files with 744
2. all dirs with 755
is there a script for that ?
thanks,
thegunman (13 Replies)
Discussion started by: TheGunMan
13 Replies
7. Shell Programming and Scripting
Hi All,
I am trying to wite a Shell script which changes the permission of the files in a folder but stuck at a particular point,please help.
The scenario is as follwoing:
I am having a list of 10 files and a folder which has 100 files.
I need to copare the list and the folder ,for... (4 Replies)
Discussion started by: Sriram.Vedula53
4 Replies
8. UNIX for Dummies Questions & Answers
while trying to view the access permissions to file by "ls -lrt" command it is opening some files int the dir after that segmentation fault ie core is generarting the dir.will anybody please what is the problem. (1 Reply)
Discussion started by: rajkumar_g
1 Replies
9. Shell Programming and Scripting
Hi, I am creating a ksh script to search for a string of text inside files within a directory tree. Some of these file are going to be read/execute only. I know to use chmod to change the permissions of the file, but I want to preserve the original permissions after writing to the file. How can I... (3 Replies)
Discussion started by: right_coaster
3 Replies
10. UNIX for Beginners Questions & Answers
Hi All,
Apologies if this question has been asked before. I havent been able to resolve an issue and would like some help.
I am getting files pushed to me via sftp. The files once pushed to my server in folder ABC have -rw------- but I need these files to have the following -rw-rw---- to be... (1 Reply)
Discussion started by: israr75
1 Replies
LEARN ABOUT DEBIAN
unshadow
UNSHADOW(8) System Manager's Manual UNSHADOW(8)
NAME
unshadow - combines passwd and shadow files
SYNOPSIS
unshadow password-file shadow-file
DESCRIPTION
This manual page documents briefly the unshadow command, which is part of the john package. This manual page was written for the Debian
GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find
weak passwords of users in a server.
The unshadow tool combines the passwd and shadow files so John can use them. You might need this since if you only used your shadow file,
the GECOS information wouldn't be used by the "single crack" mode, and also you wouldn't be able to use the '-shells' option. On a normal
system you'll need to run unshadow as root to be able to read the shadow file.
SEE ALSO
john(8), mailer(8), unafs(8), unique(8).
The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on
your system.
AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others).
John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED-
ITS file in the documentation directory.
john June 03, 2004 UNSHADOW(8)