10 More Discussions You Might Find Interesting
1. UNIX for Beginners Questions & Answers
Guys: I have a customer using the 'pdftotext' utility under Linux. PDFs are received via email, converted to text, etc. and it has worked nicely for years. They received a PDF from a customer and the utility will not read it. The text file is created but it's either empty or has 1-2 bytes of... (23 Replies)
Discussion started by: kenlenard
23 Replies
2. Solaris
Hi,
I recently started working with Solaris, and what I noticed is that a lot of commands I used to regularly use don't work, like sed -i and grep -r. I have found work arounds for these problems though but it's a pain in the ass.
I'm just wondering why they decided not to include these handy... (4 Replies)
Discussion started by: Subbeh
4 Replies
3. Red Hat
Hi,
I have noticed some performance issues on my RHEL5 server but the memory and CPU utilization on the box is fine.
I have a 1G full duplexed eth0 card and I am suspicious that this may be causing the problem. My eth0 settings are as follows:
Settings for eth0:
Supported ports: ... (12 Replies)
Discussion started by: Duffs22
12 Replies
4. Shell Programming and Scripting
As part of a quiz assigned during my unix class I was asked to write a program to ask for a file name, print read errors, and "reverse elements in a list."
I used the 'tac' command in my solution, however, I was then lectured for 5 min about the "limitations" of the 'tac' command and how a 'for'... (6 Replies)
Discussion started by: 127.0.0.1
6 Replies
5. UNIX and Linux Applications
I'm running a simulation (programmed in C) which makes calls to gnuplot periodically to plot data I have stored.
First I open a pipe to gnuplot and set it to multiplot:
FILE * pipe = popen("gnuplot", "w");
fprintf(pipe, "set multiplot\n");
fflush(pipe);
(this pipe stays open until the... (0 Replies)
Discussion started by: sedavidw
0 Replies
6. UNIX for Dummies Questions & Answers
I am trying to use the csplit file on a file that contains records that have more than 2048 characters on a line. The resultant split file seems to ignore the rest of the line and I lose the data.
Is there any way that csplit can handle record lengths greater than 2048?
Thanks (0 Replies)
Discussion started by: ravagga
0 Replies
7. AIX
Hi every body,
On AIX 4.3.3 what is the maximum file size that can be used with sort command? (0 Replies)
Discussion started by: aldowsary
0 Replies
8. UNIX for Dummies Questions & Answers
Hi All,
I want to sort a flat file which will contain millions of records based on a key/field. For this I want to use unix sort command and before that I want to make sure that unix sort command has any file size limitations. And also please let me know whether I have to change any... (2 Replies)
Discussion started by: chprvkmr
2 Replies
9. IP Networking
32 bit IP addresses with class based allocation schemes have limitations. does anyone know where i could get some info on this or if you have time to spare and really want to help me, a couple of sentences.
thanks
milos (1 Reply)
Discussion started by: 30177005
1 Replies
10. UNIX for Dummies Questions & Answers
What characters can't be used with a mkdir? Any limits on length of name?
Thank you,
Randy M. Zeitman
http://www.StoneRoseDesign.com (12 Replies)
Discussion started by: flignar
12 Replies
passwd(1) General Commands Manual passwd(1)
Name
passwd - create or change password
Syntax
passwd [-aefs] [name]
Description
The command lets you or the superuser change your password. When you enter the command, the program prompts you for the old password and
then for the new password. Next, the program asks you for the new password again, to verify that you have typed it correctly. Note that
the passwords are not displayed on the screen.
Your new password must meet the length requirements specified by the superuser. To review these requirements, refer to the file. (This is
a read-only file.)
If your system is running with increased security, you may have to choose a password from a list of randomly generated passwords, or you
may need authorization to change your password. At higher security levels, you may be prohibited from changing your password until its
minimum lifetime has expired, as specified in the Authorization Database.
If you are running the BIND/Hesiod service, your password will be updated automatically on the server.
Options
-a Supply a list of randomly generated passwords. (See the Examples section.)
-e Use an extended protocol when communicating with a prompter program. As a result, the standard input and output (used by is sent to
this program.
-f Change the finger information, not the password. The finger program provides information about current ULTRIX users, such as login and
terminal name, idle time and office location.
-s Change the login shell of the password file, not the password entry.
Restrictions
If you use a hardcopy terminal, you must destroy all print outs of valid passwords.
Examples
The following example illustrates the -a option, which displays a list of randomly generated passwords and their suggested pronunciation
with hyphens. The hyphens delineate the syllables of the passwords:
passwd -a abcd
Changing password for abcd
Here are some suggested passwords:
ryegd ryeg-di
aswurku a-swurk-u
ryedok ryed-ok
teleccs tel-ec-cos
wahislas wa-hi-slas
Enter new password:
Diagnostics
Password must be at least 6 characters long, password unchanged
Your password does not meet the minimum length requirement specified in
Warning: Only the first 8 characters of the password are significant
Your password exceeds the maximum length requirement specified in
Permission denied
You do not have the privilege to change your password. The minimum lifetime has not expired.
Password is not different enough, unchanged
Your new password must be different from your old password.
Password must be different than logname, and not resemble previous password
Your new password must be different from your login name.
Verification failed, password unchanged
You misspelled the verification of your new password.
Files
Password file
Authorization data base directory
Authorization data base page
Data base service selection and security configuration file
Only the superuser and members of the group can access the and files.
See Also
chfn(1), chsh(1), finger(1), login(1), shexp(1), yppasswd(1yp), passwd(5yp), edauth(8), vipw(8)
Guide to System Environment Setup
Security Guide for Users
Security Guide for Administrators
"Password Security: A Case History", Supplementary Documents, Volume 3: System Manager
passwd(1)