10 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
2. Shell Programming and Scripting
How to create a file in UNIX which is password protected ?
Thanks and Regards,
Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies
3. Shell Programming and Scripting
HI,
Can we add password protection for attachment of .CSV file in below command or any alternative solution.
uuencode ../reports/gtsa_lmt_pb_rfs_daily.txt gtsa_lmt_pb_rfs_daily-$FILDTE.csv |mailx -s "gtsa_lmt_pb_rfs_daily" $MAILTO
Many thanks
regards,
Sampath (4 Replies)
Discussion started by: Sampath.Rachcha
4 Replies
4. UNIX for Dummies Questions & Answers
I am trying to zip a file with password protection.
I have read all or atleast most of the threads on the website, but couldn't come up with a solution.
I am running ZIP version 2.3 on HP-UX but I dont see the -P (password) option. I read somewhere that free versions of zip don't come with... (5 Replies)
Discussion started by: pintu
5 Replies
5. UNIX for Dummies Questions & Answers
Hi Experts,
I am an SAP ABAP developer and compleatly stranger to unix and I need a help to extend a small peice of code.
Our requirement is to zip a file with password protection in a specified directory. Following is the code I am using to zip a file ZZZZ.TXT.
Here YYYY = is the path... (3 Replies)
Discussion started by: veeru4all
3 Replies
6. Shell Programming and Scripting
Hi All,
I have an input_file below and i would like to use Perl to search for the term "aaa" and output the 3rd term in the same row as "aaa".For Example, i want to search for the term "ddd" and would want the code to ouput the 3rd term in the same row which is "fff". Can somebody help ?
... (28 Replies)
Discussion started by: Raynon
28 Replies
7. AIX
Can it be done? Ive read in a few places that the crypt program no longer exists on AIX...if its do-able please tell me how. (2 Replies)
Discussion started by: rdudejr
2 Replies
8. UNIX for Advanced & Expert Users
How to set password in zip files under unix?
There are password protection available in various os.
Does unix has password protection for zip files?
Is zip and gzip command has it? (6 Replies)
Discussion started by: p_prathaban
6 Replies
9. Programming
hi floks !
i'd like to know how can i transmete a character or a string from my source code to a term and make it interpret or un by the shell wich is running in my term.
I'd like to create a Term from my code (and get its file descriptor) and then transmete each char typed on the keyboard to... (1 Reply)
Discussion started by: the_tical
1 Replies
10. UNIX for Dummies Questions & Answers
I'm new to UNIX.....
I'm trying to test a software that requires Perl. I installed Perl 5.004_04 without any problem on a UNIX SCO OpenServer Machine.
The software I'm testing also requires some Perl Modules (Net::Telnet, Test::More, Net::Telnet::Cisco & Term::ReadKey).
I installed... (4 Replies)
Discussion started by: rrivas
4 Replies
passwd(1) General Commands Manual passwd(1)
Name
passwd - create or change password
Syntax
passwd [-aefs] [name]
Description
The command lets you or the superuser change your password. When you enter the command, the program prompts you for the old password and
then for the new password. Next, the program asks you for the new password again, to verify that you have typed it correctly. Note that
the passwords are not displayed on the screen.
Your new password must meet the length requirements specified by the superuser. To review these requirements, refer to the file. (This is
a read-only file.)
If your system is running with increased security, you may have to choose a password from a list of randomly generated passwords, or you
may need authorization to change your password. At higher security levels, you may be prohibited from changing your password until its
minimum lifetime has expired, as specified in the Authorization Database.
If you are running the BIND/Hesiod service, your password will be updated automatically on the server.
Options
-a Supply a list of randomly generated passwords. (See the Examples section.)
-e Use an extended protocol when communicating with a prompter program. As a result, the standard input and output (used by is sent to
this program.
-f Change the finger information, not the password. The finger program provides information about current ULTRIX users, such as login and
terminal name, idle time and office location.
-s Change the login shell of the password file, not the password entry.
Restrictions
If you use a hardcopy terminal, you must destroy all print outs of valid passwords.
Examples
The following example illustrates the -a option, which displays a list of randomly generated passwords and their suggested pronunciation
with hyphens. The hyphens delineate the syllables of the passwords:
passwd -a abcd
Changing password for abcd
Here are some suggested passwords:
ryegd ryeg-di
aswurku a-swurk-u
ryedok ryed-ok
teleccs tel-ec-cos
wahislas wa-hi-slas
Enter new password:
Diagnostics
Password must be at least 6 characters long, password unchanged
Your password does not meet the minimum length requirement specified in
Warning: Only the first 8 characters of the password are significant
Your password exceeds the maximum length requirement specified in
Permission denied
You do not have the privilege to change your password. The minimum lifetime has not expired.
Password is not different enough, unchanged
Your new password must be different from your old password.
Password must be different than logname, and not resemble previous password
Your new password must be different from your login name.
Verification failed, password unchanged
You misspelled the verification of your new password.
Files
Password file
Authorization data base directory
Authorization data base page
Data base service selection and security configuration file
Only the superuser and members of the group can access the and files.
See Also
chfn(1), chsh(1), finger(1), login(1), shexp(1), yppasswd(1yp), passwd(5yp), edauth(8), vipw(8)
Guide to System Environment Setup
Security Guide for Users
Security Guide for Administrators
"Password Security: A Case History", Supplementary Documents, Volume 3: System Manager
passwd(1)