9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
i vi .profile Set DATE `date +%m%d%Y%H%M`, but after logout/login, echo $DATE, it shows: Fri Mar 23 15:01:53 EDT 2012, i want to show: 032320121501
please ignore.
vi /etc/profile, and export DATE=`date +%m%d%Y%H%M`, worked fine now. (0 Replies)
Discussion started by: lawsongeek
0 Replies
2. Shell Programming and Scripting
Could you please explain me what is the difference between .login, .tcshrc ,.profile file . Can I keep .tcshrc file in two different location .Actually my problem is I have one server in which another server is mounted so I have two programs which refers to two different versions of java and I need... (1 Reply)
Discussion started by: maitree
1 Replies
3. Solaris
Greetings! I'm new here and excited to get aquianted with this site! Seems like a good source of knowledge!
Anyways, my first problem de'jour deals with the following....
We have dual monitors(top/bottom) for our system. The problem is that the solaris login window is split between the top... (7 Replies)
Discussion started by: ruberked
7 Replies
4. UNIX for Dummies Questions & Answers
Hey everyone,
I'am a little new here and experincing Unix for the first time. I was wondering if somone could help me with this question i'am a bit stuck on
Looking at the content of .profile login script
The .profile file is in your login directory. It is a startup script file... (1 Reply)
Discussion started by: worldsoutro
1 Replies
5. UNIX for Dummies Questions & Answers
Hello All,
My Problem is -> How can we get UNIX id from open mail authentication (Windows ID) in UNIX.
In following command we are using domain name, which may change in your reference.
As, if we use following command.
ypcat passwd | grep rohitp | cut -d: -f5 | cut -d, -f1
=> we get... (0 Replies)
Discussion started by: pandey.rohit
0 Replies
6. UNIX and Linux Applications
Dear experts ...
Please any one can describe the diffrence between this three
1) . cshrc
2) .profile
3) .login
cheers
syed (1 Reply)
Discussion started by: smuqtaderali
1 Replies
7. UNIX for Dummies Questions & Answers
I have modified the .profile in my profile and I don't see any effect.
Why the changes don't have effect?
I tried both on the account at a server where I have limited permissions as user and to my local pc (as user).
Is it the .profile overridden by some other file? It looks weird because I... (8 Replies)
Discussion started by: myle
8 Replies
8. UNIX Desktop Questions & Answers
Dear Friends
I'm using Hp-unix release b.11.11 and i'm facing a problem to login through telnet session. i can login only by user root but other users can not login.
but if i use x window application like (reflection X) all users can login with no problem.
please kindly advice me on how to... (0 Replies)
Discussion started by: hai_jab
0 Replies
9. UNIX for Dummies Questions & Answers
Hello again !
Thanks for response of my first question. there is my second quesiton why i have local.profile instead of .profile file ?
my all files in pwd shoes local. before any file.
is anybody can tell me about that ?
Thanks
Abid Malik (5 Replies)
Discussion started by: abidmalik
5 Replies
rexecd(8c) rexecd(8c)
Name
rexecd - remote execution server
Syntax
/etc/rexecd
Description
The command is the server for the routine. The server provides remote execution facilities with authentication based on usernames and
encrypted passwords.
The command is invoked by when it receives a connection on the port indicated in the ``exec'' service specification. For further informa-
tion, see When a service request is received the following protocol is initiated:
1) The server reads characters from the socket up to a null (` ') byte. The resultant string is interpreted as an ASCII number, base 10.
2) If the number received in step 1 is non-zero, it is interpreted as the port number of a secondary stream to be used for the stderr. A
second connection is then created to the specified port on the client's machine.
3) A null terminated username of at most 16 characters is retrieved on the initial socket.
4) A null terminated password of at most 16 characters is retrieved on the initial socket.
5) A null terminated command to be passed to a shell is retrieved on the initial socket. The length of the command is limited by the upper
bound on the size of the system's argument list.
6) The command then validates the user as is done at login time and, if the authentication was successful, changes to the user's home
directory, and establishes the user and group protections of the user. If any of these steps fail the connection is aborted with a
diagnostic message returned.
7) A null byte is returned on the connection associated with the stderr and the command line is passed to the normal login shell of the
user. The shell inherits the network connections established by
Diagnostics
All diagnostic messages are returned on the connection associated with the stderr, after which any network connections are closed. An
error is indicated by a leading byte with a value of 1 (0 is returned in step 7 above upon successful completion of all the steps prior to
the command execution).
username too long
The name is longer than 16 characters.
password too long
The password is longer than 16 characters.
command too long
The command line passed exceeds the size of the argument list (as configured into the system).
Login incorrect
No password file entry for the username existed.
Password incorrect
The wrong was password supplied.
No remote directory
The command to the home directory failed.
Try again
A fork by the server failed.
/bin/sh: ...
The user's login shell could not be started.
Restrictions
Indicating ``Login incorrect'' as opposed to ``Password incorrect'' is a security breach which allows people to probe a system for users
with null passwords.
See Also
inetd(8c)
rexecd(8c)