10 More Discussions You Might Find Interesting
1. Solaris
Hi,
I need help with operating exceed from a local computer to a solaris machine using putty.
putty - version 60
Hummingbird Xserver for win 32 version 7.1.0.0
Communication mode is set to 'passive' in exceed
Following are the steps that I followed
Start 'Exceed'
Opened putty... (7 Replies)
Discussion started by: Jaguar_eyes
7 Replies
2. Solaris
PC: WinXP professional 2002, sp2
when i tried to use XDMCP Brodcast, it's not displaying any ip's and when i used XDMCP Query by giving the ip address, i couldn't see any display. In the task manager it's showing the exe as running.
what could be the problem? (3 Replies)
Discussion started by: satish@123
3 Replies
3. Solaris
Hi there,
I have a copy of Exceed 7.0, which I use on my Win XP pro machine to get access to the Solaris CDE, but this version will not run on my Vista laptop.
Do I need to get the very latest version of Exceed to run on Vista ? or is there an interim version which I might find on Ebay ?
... (2 Replies)
Discussion started by: Freddo_21
2 Replies
4. UNIX for Advanced & Expert Users
Hi Gurus
I am facing problem in using Exceed to connect to one HP Ux server. I used Exceed (XDMCP-Broadcast) but can't see the IP address of the server I want to connect to. What could be the reason for this ? (Network Connectivity is fine as I can connect using telnet)
Then I used Client... (2 Replies)
Discussion started by: Amardeep
2 Replies
5. Windows & DOS: Issues & Discussions
I have Exceed on Demand V3.2 (I know it's older). I have multiple monitors at my desk and can move the x-windows across both monitors but can only type in monitor(A). I can resize windows in both monitors(A & B) and can clearly tell "window focus" is gained in the window for the monitor(B) for... (2 Replies)
Discussion started by: rcarnesiii
2 Replies
6. HP-UX
Hi,
I have a HP-UX 11.11 server right now we are using putty for login by SSH now we want to the upgrade the Oracle of this server for that we need the connectivity through (Exceed or X-Manager) for GUI.
Somebody please help me how can we connect this server by Exceed or X-Manager
Thanks... (0 Replies)
Discussion started by: bhupals
0 Replies
7. HP-UX
Hello HP-UX Gurus,
I am having issues trying to start an x-session via eXceed 7.1.
When I bring up eXceed via XDMCP Braodcast I see the host name and IP Address but when I try to connect the X window does not come up.
I made the modification to the following file “/etc/dt/config/Xaccess”... (2 Replies)
Discussion started by: smokie
2 Replies
8. UNIX for Dummies Questions & Answers
I wanted to know difference between Telnet/Hummingbird- Exceed/FTP.
THe reason why i asked the question b'coz i have three cad systems & two are in windows environment & one in unix
I wanted to put all three into network & share the data.
Which software you wanted to purchase & how could i... (1 Reply)
Discussion started by: kar1
1 Replies
9. UNIX for Advanced & Expert Users
Does anyone know how to get exceed to bring up the CDE in Windows. I have been trying and only get the telnet to come up. (2 Replies)
Discussion started by: aojmoj
2 Replies
10. UNIX for Dummies Questions & Answers
Does anyone know if there any application perform better than Exceed? It seems some video card doesn't support Exceed.
thx (1 Reply)
Discussion started by: E-Quality
1 Replies
shadow(4) Kernel Interfaces Manual shadow(4)
NAME
shadow - shadow password file
SYNOPSIS
DESCRIPTION
The file is created from the file by the command. It is readable only by a privileged user. It can be modified by the and commands. Pro-
grams may use the interfaces described in the getspent(3C) manpage to access this information. These functions return a pointer to an
structure, which is defined in the header file.
Fields
The file is an ASCII file consisting of any number of user entries separated by newlines. Each user entry line consists of the following
fields separated by colons:
login name Each login name must match a login name in puts the user entries in in the same order as the entries.
encrypted password
The password field of each entry contains an "x", and the actual encrypted passwords reside in The encrypted password field
consists of 13 characters chosen from a 64-character set of "digits". The characters used to represent "digits" are for 0,
for 1, through for 2 through 11, through for 12 through 37, and through for 38 through 63.
If the SHA11i3 product is installed, the password field may contain the prefix , where n is a label identifying an alterna-
tive algorithm used for the password hash. Using the new algorithm results in an encrypted password field which is longer
than 13 characters. The password field will consist of digits from the same 64-character set, as well as the additional
character used as a delimiter.
If this field is null, then there is no password and no password is demanded on login. Login can be prevented by entering a
character that is not a part of the set of digits (such as *).
last change
The number of days since January 1, 1970 that the password was last modified.
min days
The minimum period in days that must expire before the password can be changed. See also in security(4) and the command in
passwd(1).
max days
The maximum number of days for which a password is valid. A user who attempts to login after his password has expired is
forced to supply a new one. If min days and max days are both zero, the user is forced to change his password the next time
he logs in. If min days is greater than max days, then the password cannot be changed. These restrictions do not apply to
the superuser. See also in security(4) and the command in passwd(1).
warn days
The number of days the user is warned before his password expires. See also in security(4) and the command in passwd(1).
inactivity
The maximum number of days of inactivity allowed. This field is set with the option of either the or command. If this value
is greater than zero, then the account is locked if there have been no logins to the account for at least the specified num-
ber of days. If this value is less than or equal to zero, the value is determined by the attribute. See the description of
in security(4).
expiration
The absolute number of days since Jan 1, 1970 after which the account is no longer valid. A value of zero in this field
indicates that the account is locked.
reserved
The reserved field is always zero and is reserved for future use.
Notes
The file is not applicable to a system which has been converted to a trusted system.
WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
FILES
system password file
shadow password file
SEE ALSO
login(1), passwd(1), pwconv(1M), pwunconv(1M), useradd(1M), userdel(1M), usermod(1M), crypt(3C), getspent(3C), putspent(3C), nss-
witch.conf(4), passwd(4), security(4).
shadow(4)