11-10-2005
protect from rm
Hi,
I wrote an rm script to force all time rm -i.
This You can set as variable in .profile.
At first will asked the enviroment, so the user will asked all time.
The same You can do for mv und cp. If any file exists, the command will asked the user before overwriting.
Best regards
Dieter
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
we have an hp-ux and a user requested me if i can password protect the dtterm. i know that this is possible but can you give me some hints in making this happen?
thanks :cool: (2 Replies)
Discussion started by: inquirer
2 Replies
2. UNIX for Dummies Questions & Answers
I have created a PHP page that I use to clean files on my machine. I would like to leave the file there but I want to password protect it so that I am the only one that can run it from the shell. Does anyone know how to do this? Thanks.
-Cam (2 Replies)
Discussion started by: perryl7
2 Replies
3. UNIX for Dummies Questions & Answers
Hello,
Can someone give me some recommendations on how to protect this account? I understand that this account is an "operator" account and has root access.
Thanks in advance (5 Replies)
Discussion started by: susie2345
5 Replies
4. Cybersecurity
Hi!
Looking for some feed back on this tutorial...
Thank you for checking out this thread.
I'm working on some killer videos right now that will explain in detail how you can protect your website against hackers. The first part of the video series is live right now and it covers Cross-Site... (2 Replies)
Discussion started by: Arne1983
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I have a process which takes 13-15 mins for execution and its getting killed in the meantime.So can you please helpme out how to protect the process from getting killed.
Thanks in advance.
Regards,
Harika (9 Replies)
Discussion started by: harikagrp
9 Replies
6. UNIX for Advanced & Expert Users
how to protect my process from others to kill??
Double post, continued here, thread closed (0 Replies)
Discussion started by: samrintu
0 Replies
7. UNIX for Dummies Questions & Answers
Afternoon,
the stat command is used against a file to ascertain date created and last modification time. However a different individual if they so chose could use the touch command to alter the date created or modification time.
Is there anyway to protect against this ?
thanks
Steve (2 Replies)
Discussion started by: sevans29
2 Replies
8. Cybersecurity
Hello there,
I would like to protect a Linux system from cloning, I don't mind if the cloned hard drive works in the same computer, but I need to avoid it to work in other one, even if it uses exactly same mainboard model and rest of computer parts. I want the cloned system to get frozen or... (4 Replies)
Discussion started by: Installimat
4 Replies
9. Shell Programming and Scripting
Is there a way to have a user be prompted for a password to open a file? I am trying to protect a bash script from being changed. Thank you :). (3 Replies)
Discussion started by: cmccabe
3 Replies
LEARN ABOUT MOJAVE
install-mh
INSTALL-MH(8) [nmh-1.5] INSTALL-MH(8)
NAME
install-mh - initialize the nmh environment
SYNOPSIS
/usr/lib/mh/install-mh [-auto] [-check] [-version] [-help]
DESCRIPTION
Install-mh is the nmh program to create the initial setup for a first-time nmh user. Install-mh lives in two places for historical rea-
sons.
The -auto option does things as automatically as possible and makes install-mh less chatty.
The user is asked for the name of the directory that will be designated as the user's nmh directory. If this directory does not exist, the
user is asked if it should be created. Normally, this directory should be under the user's home directory, and has the default name of
``Mail''. Install-mh writes an initial .mh_profile for the user.
As with all nmh commands, install-mh first checks for the existence of the $MH environment variable since that gives the profile path if
set. If it isn't set, the $HOME environment variable is consulted to determine the user's home directory. If $HOME is not set, then the
/etc/passwd file is consulted.
When creating the users initial .mh_profile, install-mh will check for the existence of a global profile /etc/nmh/mh.profile. If found,
this will be used to initialize the new .mh_profile.
The -check option can be used to check whether or not nmh has been installed. This can be used by other programs to determine whether or
not nmh has been installed without their having to know the internals of nmh.
FILES
$HOME/.mh_profile The user profile
/etc/nmh/mh.profile Used to initialize user profile
PROFILE COMPONENTS
Path: To set the user's nmh directory
CONTEXT
With -auto, the current folder is changed to "inbox".
MH.6.8 11 June 2012 INSTALL-MH(8)