10 More Discussions You Might Find Interesting
1. Solaris
I have just installed Solaris 11. When I turn the computer on I don't want to see a login in screen. I want to automatically be logged in as "SUPERUSER".
My research tells me someone is going to tell me that's not wise or safe. I'm not interested in security advice. If someone I know is... (10 Replies)
Discussion started by: kkeevv
10 Replies
2. UNIX for Dummies Questions & Answers
I'm trying to add a superuser (admin) to plesk from SSH (I have root access). Can this be done? I have search over the web but did not find any solution to my problem. My version is Plesk 9.3 (0 Replies)
Discussion started by: galford
0 Replies
3. UNIX for Dummies Questions & Answers
Hello!
I found this on net:
This is the ``prompt''. If you entered you username, or your password incorrectly, you will be greeted by:
Login incorrect
localhost login: Don't panic, try again. Likely you either mis-typed either your login name, or your password. Try again. You're not... (2 Replies)
Discussion started by: pinklemon
2 Replies
4. Solaris
Hi!
Can someone please tell me how to log-in to Solaris as a superuser or as a root?
I have tried using "root" as a username, and my superuser password i had set in the terminal for the log-in password but it says "Roles can only be assumed by authorized users". "Permission denied."
I'm... (1 Reply)
Discussion started by: CarlosP
1 Replies
5. Solaris
I have a korn shell script (main.sh) owned by unix account "A". I want to execute certain lines in the script using another user "B" (with user "B" login profile). I need to do this way for multiple lines to be executed using different unix accounts in main.sh.
I was trying to use "su -... (3 Replies)
Discussion started by: Ashok_107
3 Replies
6. Shell Programming and Scripting
hi All,
In my script I want to run some drop and select statements in the same host as a different user.I am inputting password for the superuser from the user who will be executing the script.
ie ,
I would be greatfull to you experts if you could suggest me how to proceed. (4 Replies)
Discussion started by: Sreejith_VK
4 Replies
7. UNIX for Dummies Questions & Answers
Can I create a superuser account in scoadmin? If not how do I do it via command line (0 Replies)
Discussion started by: maconte
0 Replies
8. UNIX for Dummies Questions & Answers
My first post:
in /etc/rc2.d i have a startup script: Script1.
if you run #>scirpt1 stop/start from any user other than root you will get u must be supper user to run this script. eventhough the rights are 777.
Question: how can i get my user_a be able to run this script to stop and start it... (2 Replies)
Discussion started by: bcheaib
2 Replies
9. UNIX for Advanced & Expert Users
Hi All,
Oracle 8.0 database is running on SCO-UNIXWARE 7.0 Operating system. Some how ORACLLE DATABASE has crashed. After rebooting the PC only the SUPER USER could login. No other user is able to login.
we need ORACLE user to start the DATABASE again.
It is asking for the password, after... (2 Replies)
Discussion started by: konda
2 Replies
10. UNIX for Dummies Questions & Answers
how can i change the superuser password?
the admin left the company, and we want to change the password.
to gain su access, i use:
# su -
password:***** (old password)
then, using passwd command it changes my own login password, not the root??
(this is not trying to block anybody's... (4 Replies)
Discussion started by: apalex
4 Replies
asecure(1M) asecure(1M)
NAME
asecure - control access to Audio on a workstation (OBSOLETED)
SYNOPSIS
[] [] [] [] []
[] [] [] []
DESCRIPTION
On Series 700 workstations, audio is secured so that only the user on the local workstation can access audio. You use the command to mod-
ify audio security. This command does not apply to X stations; on an X station, access to audio is unrestricted.
To modify audio security, become root on the local workstation where you want make a change. Then, use as follows:
When prompted, enter any meaningful password. Issuing creates the Audio Security File (ASF). The ASF contains information that determines
which hosts and users can access the Aserver, and which users (other than the superuser) can modify the ASF.
If needed, you can allow unrestricted access to audio on this workstation. To remove audio security, issue this command:
If instead, you wish to modify security, you use to make changes to the information in the ASF. (Because the ASF is a binary file, we do
not recommend using an editor on this file.) You can use to make these types of changes:
o Allow all clients from a remote host to access the server.
o Allow specific users from all other hosts to access the server.
o Allow a specific user from a specific host to access the server.
o Disable access control, allowing complete unrestricted access to the server, but leaving the ASF intact.
Every operation that creates, reinitializes, or changes the contents of the ASF is logged in the file, so that you can track any changes to
the ASF.
Options
supports the following options:
Add/delete hostname,username pair. You must be either superuser or a to do this. You can supply more than one hostname,username
pair separated by blanks.
To use either the or options, you MUST supply at least one hostname,username pair. This option will not work without
a pair.
Create a new ASF file, called the
file. Access control default is enabled with no entries in the access list. Aserver can now be accessed only by local
users on the host machine. If an file already exists, it is re-initialized.
You must be superuser to execute this option. This option is mutually-exclusive of all other options.
This option requires a password. This is an extra layer of protection for the contents of the ASF. It is designed to
prevent surreptitious manipulation of the ASF. If you are creating a new ASF, you are prompted for a password and an
encrypted copy of that password is stored in the new ASF.
If the ASF already exists, you are prompted for the password. If your password matches the password stored in the
ASF, the ASF is then re-initialized.
Disable access control to the Aserver. This allows unrestricted access by
all clients.
Enable access control to the Aserver. This restricts access to clients listed
in the ASF. Enabled is the default state.
Add/delete hostnames for ALL users. You must be either superuser or a to do this. You can supply more than one hostname sepa-
rated by blanks.
List the contents of the ASF. This option shows a list of the hostnames
and/or usernames that have access to the Aserver.
Change password for
file. You must be superuser to do this. You are prompted once for the old password, then prompted twice for the new
password.
Add/delete You must be superuser to do this and must enter the password given when the ASF was created (see option). To see a
list of privileged users, you must be superuser and use the option.
Add/delete usernames for ALL hosts. You must be either superuser or a to do this. You can supply more than one username sepa-
rated by blanks.
EXAMPLES
List entries in access list.
Disable access control. This means anyone can connect to Aserver without restriction.
Add host for all users to access list. Remove host for all users from access list.
Add user for hosts and to access list.
Add user to access list for all hosts. Remove users and from access list for all hosts.
Create new access list.
AUTHOR
was developed by HP.
FILES
asecure log pathname
ASF pathname
SEE ALSO
attributes(1), convert(1), send_sound(1), asecure(1M), aserver(1M), audio(5).
OBSOLETED asecure(1M)