Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

nwbols(1) [suse man page]

NWBOLS(1)							      nwbols								 NWBOLS(1)

NAME
nwbols - List NetWare Bindery Objects SYNOPSIS
nwbols [ -h ] [ -S server ] [ -U user name ] [ -P password | -n ] [ -C ] [ -t type ] [ -o pattern ] [ -v ] DESCRIPTION
nwbols lists the specified NetWare Bindery Objects visible for the user. nwbols looks up the file $HOME/.nwclient to find a file server, a user name and possibly a password. See nwclient(5) for more information. Please note that the access permissions of $HOME/.nwclient MUST be 600 for security reasons. OPTIONS
-h -h is used to print out a short help text. -S server server is the name of the server you want to use. -U user user is the user name to use for login. -P password password is the password to use for login. If neither -n nor -P are given, and the user has no open connection to the server, nwbols prompts for a password. -n -n should be given if no password is required for the login. -C By default, passwords are converted to uppercase before they are sent to the server, because most servers require this. You can turn off this conversion by -C. -t type You can restrict the objects listed by specifying the type of the objects to be listed. type must be given as a decimal number. -o pattern Specifying a pattern is another way to restrict the objects listed. Please note that this pattern is evaluated by the NetWare server. grep would be a better candidate for complex patterns. -v By default, the object's name, its ID and its type are listed by nwbols. In the verbose mode, activated by -v, the object flags, its security byte and the properties flag is also listed. AUTHORS
nwbols was written by Volker Lendecke. See the Changes file of ncpfs for other contributors. nwbols 7/9/1996 NWBOLS(1)

Check Out this Related Man Page

NWBORM(8)							      nwborm								 NWBORM(8)

NAME
nwborm - Remove a NetWare Bindery Object SYNOPSIS
nwborm [ -h ] [ -S server ] [ -U user name ] [ -P password | -n ] [ -C ] [ -o object name ] [ -t type ] DESCRIPTION
nwborm removes the specified NetWare Bindery Objects. nwborm looks up the file $HOME/.nwclient to find a file server, a user name and possibly a password. See nwclient(5) for more information. Please note that the access permissions of $HOME/.nwclient MUST be 600 for security reasons. OPTIONS
-h -h is used to print out a short help text. -S server server is the name of the server you want to use. -U user user is the user name to use for login. -P password password is the password to use for login. If neither -n nor -P are given, and the user has no open connection to the server, nwborm prompts for a password. -n -n should be given if no password is required for the login. -C By default, passwords are converted to uppercase before they are sent to the server, because most servers require this. You can turn off this conversion by -C. -o object name The name of the object to be deleted. -t object type The type of the object. Object type must be specified as a decimal value. Common values are 1 for user objects, 2 for group objects and 3 for print queues. Other values are allowed, but are usually used for specialized applications. AUTHORS
nwborm was written by Volker Lendecke with the corresponding Caldera utility in mind. See the Changes file of ncpfs for other contributors. nwborm 7/9/1996 NWBORM(8)
Man Page

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

login question

Why, when you type in an obviously invalid login, does UNIX give you an opportunity to type in a password? Is it a security thing? (1 Reply)
Discussion started by: grassaj
1 Replies

2. UNIX for Dummies Questions & Answers

Login Console

Hi All, I am very new to Unix and already have a problem... My predecessor didn't note down the username and password to login to the console of an HP D Class 9000 enterprise server we have. I was wondering whether there is any way to bypass this console login screen in Unix... If not is there... (1 Reply)
Discussion started by: RMadjitey
1 Replies

3. AIX

About the Lotus Note(Pls answer me)

Any one can pls tell me that can lotus-note work on AIX Unix system? if yes which server of the lotus note server got support? 10s a lot (2 Replies)
Discussion started by: 4602331
2 Replies

4. Cybersecurity

Security broken

Hi, I had a Unixware 7.1.3 server, the clients are connect to server by telnet for to run an aplication. After the login and password, to appears the applications window main, when the client finish his work in that program the connection is out. One client had been obtain to apears in the... (1 Reply)
Discussion started by: By_Jam
1 Replies

5. Linux

server type (HP etc)

hello, what is the command to have information about commercial server type ? rgds (4 Replies)
Discussion started by: madmat
4 Replies

6. Shell Programming and Scripting

most current entries of particular pattern

I have many files coming from different objects in a text file. All objects have a file of the each dates....i.e (11july,12 july, ... so on) as convention of (object1_july11,object2_july11,object3_july11,object1_july12,object3_july12.. so on). Now sometimes the file from object stops coming... (1 Reply)
Discussion started by: partha_bhunia
1 Replies

7. UNIX for Dummies Questions & Answers

New Approach Hiding login password from ps -ef

Hello all , I looked up this site for solutions to hide login info from ps -ef | grep like using a seperate file and store the password in that especially for oracle sqlplus scripts. I just got this thought , But dont know how to implement this in UNIX. Is there a way to revoke access from... (17 Replies)
Discussion started by: simonsimon
17 Replies

8. Shell Programming and Scripting

Find Output Formatting

Greetings, I need to find few patterns related to password (pwsd, pwd, password etc) in a directory includig sub -directories. I need to redirect the output of find (in combination with grep) to a file which will be later used to verify the files. OS is Sun Solaris 5.10. The out put file format... (3 Replies)
Discussion started by: Rajpreet1985
3 Replies

9. Cybersecurity

Ssh password less login with different ID

Hi, I have setup password less ssh connection between Server A and Server B and I am able to connect with User2. But my requirement is, User 1 run a script in Server A to ssh into Server B as User 2 but it is asking password every time I execute. Server A: Login as User 1 and execute sh... (8 Replies)
Discussion started by: sakthi.99it
8 Replies

10. UNIX for Dummies Questions & Answers

Restricting File List while doing ls

Is there any best way to restrict some of the listed files when you do ls. In the output i am doing grep -v wanted to see if i can use a better command to get this output. Command: > ls -lrt wf_Load_25.log.INSTANCE_21_20072.* -rw-r--r-- 1 infrmtca infrmtca 19373 Mar 12 14:14... (1 Reply)
Discussion started by: Ariean
1 Replies