10-13-2000
Yes. In fact, good login implementions should not give a clue as to either the correctness of the login name or the password. Consider this:
When the login method receives a user name, it would have to open the password file and check for valid name, if correct, it might then close the file and read the password, or keep the file open and read the password, etc.
If you do an analysis of how the userid and password are entered into the method and compared against the password file, it can be seen upon analysis why the login function works as described.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi all
I am administering Linux boxes (running rehat linux 7.3 and 8.0).
The other day I tried to ssh from 1 linux box to the other. I was root on the client box. Surprisingly, I could login as root into the host after giving the password!! I am unable to get root login from a SSH client... (2 Replies)
Discussion started by: skotapal
2 Replies
2. UNIX for Dummies Questions & Answers
hi all,
what file(s) needs to be changed and in what way in order to do the following:
when user A logs onto freebsd 4.8 automaticaly he needs to start up a script a made that executes:
sets ltp0 in polling mode,
executes tn5250 keyboard mapping
starts tn5250 with the correct parameters.
... (2 Replies)
Discussion started by: termiEEE
2 Replies
3. Shell Programming and Scripting
I have been searching how to do this and haven't been able to make it work. When I login to our Unix machine running SunOS 5.8 it automatically starts in csh but I want bash. I don't have access to chsh or password commands so I guess I need to change .profile or .login or .cshrc? Which one and... (2 Replies)
Discussion started by: blackw
2 Replies
4. Solaris
I post this question because it seems that no many people will knows about this. I hope to meet some real guru to help me out. Here is the question:
I isntalled solaris 10 on Sun sparc 64 bit machine. I can login as root user through GUI or console. After I created an Oracle user, I only can... (1 Reply)
Discussion started by: duke0001
1 Replies
5. UNIX for Advanced & Expert Users
I post this question because it seems that no many people will knows about this. I hope to meet some real guru to help me out. Here is the question:
I isntalled solaris 10 on Sun sparc 64 bit machine. I can login as root user through GUI or console. After I created an Oracle user, I only can... (2 Replies)
Discussion started by: duke0001
2 Replies
6. UNIX for Dummies Questions & Answers
Hey everyone,
I'am a little new here and experincing Unix for the first time. I was wondering if somone could help me with this question i'am a bit stuck on
Looking at the content of .profile login script
The .profile file is in your login directory. It is a startup script file... (1 Reply)
Discussion started by: worldsoutro
1 Replies
7. Red Hat
hi Guys , I m completely new to this environment.
I m working in linux gnu operating type.
I have root user access to this machine and i have created a user named scott using useradd command then set its password using passwd command.
Now my problem is i m not able to loggin using this new... (4 Replies)
Discussion started by: pinga123
4 Replies
8. Shell Programming and Scripting
Hi all,
I am OpenBSD newbie and currently need to manage some OpenBSD firewalls running pf. The OpenBSD version is 4.8
As the other sys admins are not so familiar with OpenBSD, so I have an idea across in my mind on how to minimize the root account usage and other unnecessary access and make... (9 Replies)
Discussion started by: lcxpics
9 Replies
9. UNIX for Beginners Questions & Answers
Purely out of curiosity, but what would happen in all accounts were locked out from being able to be logged in to?? The root account, on most unix-based systems, is locked by default. What if all other login-enabled accounts were changed to be login-disabled?? If such a thing were possible, would... (1 Reply)
Discussion started by: Huitzilopochtli
1 Replies
10. Solaris
Hi Folks,
I am studying for my 1z0-821 exam and I would like to clarify an answer to the following question :
You have a ticket from a new user on the system, indicating that he cannot log in to his account.
The information in the ticket gives you both the username and password. The ticket... (2 Replies)
Discussion started by: Ravneet_Pal
2 Replies
LEARN ABOUT REDHAT
nwborm
NWBORM(8) nwborm NWBORM(8)
NAME
nwborm - Remove a NetWare Bindery Object
SYNOPSIS
nwborm [ -h ] [ -S server ] [ -U user name ] [ -P password | -n ] [ -C ] [ -o object name ] [ -t type ]
DESCRIPTION
nwborm removes the specified NetWare Bindery Objects.
nwborm looks up the file $HOME/.nwclient to find a file server, a user name and possibly a password. See nwclient(5) for more information.
Please note that the access permissions of $HOME/.nwclient MUST be 600 for security reasons.
OPTIONS
-h
-h is used to print out a short help text.
-S server
server is the name of the server you want to use.
-U user
user is the user name to use for login.
-P password
password is the password to use for login. If neither -n nor -P are given, and the user has no open connection to the server, nwborm
prompts for a password.
-n
-n should be given if no password is required for the login.
-C
By default, passwords are converted to uppercase before they are sent to the server, because most servers require this. You can turn off
this conversion by -C.
-o object name
The name of the object to be deleted.
-t object type
The type of the object. Object type must be specified as a decimal value. Common values are 1 for user objects, 2 for group objects and
3 for print queues. Other values are allowed, but are usually used for specialized applications.
AUTHORS
nwborm was written by Volker Lendecke with the corresponding Caldera utility in mind. See the Changes file of ncpfs for other contributors.
nwborm 7/9/1996 NWBORM(8)