Fedora :: Shadow On My Desktop

Apr 7, 2011

There's some sort of shadow on my right desktop. No idea how it got there and it persists through reboots.

View 2 Replies


ADVERTISEMENT

Fedora :: Upgrade Left Shadow On KDE Desktop

Jan 31, 2011

I upgraded to F14 from F13, and when the process was complete, I noticed on my desktop, I have a strange drop shadow on the left-hand corner. As if it's shadowing an invisible window. You cannot interact with it, it's not "really" there.It is very annoying, and I can not figure out what it is, or what is causing it. I've checked all my plasma widgets and things like that, but it still persists.

Anyone run into this before or have any ideas?Here is a screenshot showing the shadow, I intentionally set my background to white, so you could see it best. But it shows up on top of any wallpaper. and you can clearly see it underneath translucent term windows/etc.

View 4 Replies View Related

General :: Using Fedora 11 Password, Shadow, Gshadow, Group Files In Fedora 12?

Apr 28, 2010

I recently mashed the passwd, shadow, gshadow, group files in my Fedora 12 installation. I was dumb and didn't take a copy of the originals and all I have is the originals from a Fedora 11 installation.

View 2 Replies View Related

Fedora Networking :: NX On 10 - Shadow Session On Local Display?

Jan 3, 2009

Has anybody been able to get NX (Nomachine) running on Fedora 10 configured using a shadow session of the local desktop (X11-local). I am experiencing some kind or cookie creation error, perhaps privilege related?

FYI. Normal unix-kde sessions work fine (e.g. Giant on Box) and shadow sessions of an existing unix-kde session works fine too. A shadow session of the local display is a bust.

Here's the error log:

Code:
NX> 203 NXSSH running with pid: 4076
NX> 285 Enabling check on switch command
NX> 285 Enabling skip of SSH config files
NX> 285 Setting the preferred NX options

[Code]....

View 14 Replies View Related

Fedora Installation :: Can't Modify Files Like Shadow Or Config

Aug 3, 2011

1- how I can deactivate selinux and the root password on fedora 15?

2- I can't use copy, cut past in the GUI !!

3- even with (su -) I can't modify files like shadow or config !

View 10 Replies View Related

Fedora Servers :: Vi Editing Etc/shadow - E45 'readonly Option Is Set - Add To Override

Jan 8, 2010

I'm learning to configure tftp-server and using vi editor - google search not helpful at least what comes up first - maybe different in Fedora ?

[url]

Code:

But . . . vi editing etc/shadow I get . . . E45: 'readonly' option is set (add ! to override)

In INSERT MODE - do I add ! as !wq instead of :wq as I found in google search (that's NOT working) - - or - do I add ! on the line to set tftp server password to * -or - what?

View 6 Replies View Related

Fedora Security :: Error - Cannot Read /etc/shadow: Permission Denied

Jan 20, 2010

This is weird, today I updated my system and while trying to visudo from single user mode got

"cannot read /etc/shadow: Permission denied"

which kept me from doing anything until I switched to file permissions of 400 on shadow, then back. Is this being experienced by anyone else or just me? /etc/security/limits.conf doesn't seem like it wants to change in enforcing mode either and I can't find any alerts to provide clues on the situation.

View 8 Replies View Related

Fedora Security :: SELinux Blocking Sshd Access To Shadow?

Mar 6, 2010

I'm trying to setup ssh access on my Fedora 12 laptop. I get the following error message in /var/log/secure when I try to login from another machine using ssh and the login is denied:

Code:

sshd[3025]: error: Could not get shadow information for <user>
sshd[3025]: Failed password for <user> from <ip> port <port> ssh2

If I do a 'setenforce 0' I can login and no error is logged.

View 10 Replies View Related

Fedora Security :: Generating Password Hashes Compatible With FC11/sha-512 Shadow File?

Jul 3, 2009

I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)

View 3 Replies View Related

Ubuntu :: Shadow Under Top Bar Turn Black?

Apr 30, 2011

The shadow that is meant to appear under the bar at the top of the screen in unity seem to be overlaying on top of itself every time and eventually turned black

View 3 Replies View Related

Ubuntu :: Black Shadow Below Task Bar

Jul 26, 2011

getting a black shadow below the taskbar recently in ubuntu 11.04. anybody got an idea how to fix it?

View 5 Replies View Related

Security :: User Appear In /etc/shadow And Not /etc/passwd

Jul 28, 2010

In what cases would a user appear in /etc/shadow and not /etc/passwd

View 2 Replies View Related

Software :: Password Encryption In /etc/shadow?

Jun 16, 2009

I am moving my Linux server from Suse 10 to Ubuntu 9.04 and I moved the significant parts of /etc/shadow, /etc/passwd, and /etc/group over to Ubuntu 9.04. I am not able to login into the computer with the old accounts. The only problem I see is that the old accounts use Blowfish and DES to encrypt the passwords in /etc/shadow, and Ubuntu uses SHA512. If I change the passwords, the accounts will work. However; I have about 300 accounts to move, and I don't want to do that to all of them. I have tired Ubuntu Forums and talked to every linux expert I know, and no one has an answer.

View 7 Replies View Related

Ubuntu :: How To Enable Shadow For Tooltip Window

Nov 2, 2010

I get used to have shadow for tooltip window in my desktop environment. But from Ubuntu 10.04, the defaut setting disables shadow for tooltip. And I don't feel good about such minor change.So how to enable shadow for tooltip window again? (ubuntu 10.04 + gnome 2.30)

View 1 Replies View Related

Ubuntu :: How To Delete WIndows Shadow Copies VSS

Feb 19, 2011

I deleted Windows from my Notebook and am only rockin Ubuntu on this machine. On the (previously) shared Data Partition, there are dozens of GBs occupied by the Volume Shadow Copy Service backups (which I used with Windows) but now how do I get rid of these?In Windows you could either turn off VSS/Restore under System Protection or alternatively use the Disk Cleanup Utility. How do I do this with Ubuntu?

View 6 Replies View Related

Ubuntu :: Equivalent To Windows Shadow Copy?

Mar 29, 2011

Here at work we've made very good use of Server 2003's Shadow Copy service, which lets me restore users' files quickly and easily using the Previous Versions software--yet takes minimal resources and storage space on the server. I've also heard that the service may be available to users in Windows 7. Is there an equivalent of this in Ubuntu? Something I could set up that would snapshot files on my hard drive every so often, and let me recover deleted files or earlier versions of files?

View 1 Replies View Related

Ubuntu :: Shadow Certain Type Of Window With Emerald

Jul 12, 2011

I'm using this metacity theme along with the included (and AMAZING) emerald theme for the window borders. Just wondering if there's any way I can keep the window borders as they are, but put shadows on for the gnome-panel and my stickynotes? See HERE.When I try to adjust the shadow settings in emerald, it changes everything -- including the window borders, which make the theme look horrible.I know I can specify certain types and classes of windows when using compiz as default window decorator with ccsm, but is there any way to do something like this with emerald?

View 3 Replies View Related

Ubuntu Security :: Can Make New Algorithm For /etc/shadow

Aug 16, 2011

i use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..

how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method

View 7 Replies View Related

Debian :: How /etc/shadow File Authenticates An User ?

Feb 9, 2011

i am new to debian. I need to know after booting sequence login shell appears to get username and password. so what happens when user puts username and password ?? how this given username and password are matched with /etc/shadow file ??

my another question is what is role of /etc/pam.d/ authenticating username and password ?? does it work with shadow file or not ?

View 3 Replies View Related

General :: Normal For /etc/shadow To Change It's Timestamp?

Aug 1, 2010

I noticed that file /etc/shadow changed it's timestamp.Why it is changed? Is it "normal"?

View 4 Replies View Related

General :: Shadow File Password Policy?

Oct 1, 2010

Today i was going through some of security guides written on linux .Under shadow file security following points were mentioned.1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.2)Usernames in shadow file must satisfy to all the same rules as usernames in /etc/passwd.3)password for application Username should display * if username is not locked.4)If a user is locked it should be displayed as ! as the first character in second field of shadow file.

Confusion for point 1 and 2:Now i m confused as why the encrypted password should be more than 14-25 characters.Also what rules to satisfy How to check it?Confusion for point 3 and 4:There are lot of users with * as second field i guess they are not locked but according to 4th point there are lot of users with ! as first characters.How would i check whether they are actually locked or not.I m posting the output of /etc/shadow and /etc/passwd files for the account.

View 11 Replies View Related

General :: What Encryption Does The /etc/shadow File Use For Passwords

Nov 26, 2009

I am just wondering what encryption method the shadow file uses, so that I may be able to manually change it. I ask this because I am trying to make a web page that will allow people to change their linux password via a browser.

View 4 Replies View Related

Security :: Shadow Password Hashes - If My $id$ Was $5$, Which Is Sha256?

Apr 26, 2011

The /etc/shadow file contains an id of $1$, $2$, $5$ or $6$ to show the encryption method used.A salt follows this,followed by the password hash.When a user is created and a password is set, a hash is RANDOMLY generated and used as the salt to the password hash. Everytime that user logs in, login checks /etc/shadow for the $id$ and salt and runs the password given by the user through the hash mechanism ($id$) using the salt in /etc/shadow.So basically does login look at /etc/shadow for the $id$ and salt to create a hash with which to compare to the /etc/shadow hash?question 2 - If my $id$ was $5$, which is sha256, how would i go about changing this? Like is there a shadow.conf or crypt.conf or something? Can i change it per user?

View 2 Replies View Related

Server :: Migrate From LDAP To Regular Shadow?

Jun 16, 2010

I need to make a backup of the ldap (users and passwords). Is there a tool to do this? I've found o the internet only the shadow to ldap version

View 1 Replies View Related

Software :: Convert An MD5 Hash Into Shadow Format?

Nov 28, 2010

I am trying to use John the Ripper but it doesn't take regular MD5 hashes, only shadow MD5 hashes. For example this hash: 900150983cd24fb0d6963f7d28e17f72 (which, decrypted, is 'abc') within a text file, John the Ripper does not detect because it is not shadow format. How can I convert this MD5 hash into shadow format?

View 1 Replies View Related

Programming :: Bird Eye View Game Shadow

Mar 25, 2011

I've been working on this console-based game (in c) in which the player walks around touches floating orbs which do things etc. And I want to make it so that an object on the map blocks the sight of the player, which is something I haven't tried until now. This is the part of the code which handles this sort of thing :

void uncover(int shadow)
{
int wp,
hp,
xp,
yp,
pp, // point placement
mp, // maximum pp value // (that's what she said)
lp; // light placement .....

This <works> but isn't very nice. What I would like to do is to change the third to last if statement, which is really more of a geometry problem, which could be frased as :
given points (x,y) , (plist[pp].x,plist[pp].y) and (wp,hp) create a conditional which tests weather or not point (wp,hp) is within the shadow cast by light-source (x,y) being blocked by an object at (plist[pp].x,plist[pp].y), [with some width, ~1]
but there isn't a geometry forum, and it's somewhat more related to programming.

View 14 Replies View Related

Slackware :: How To Do 'shadow' Session With Freenx Client

Jan 10, 2010

Does anyone know how to do a 'shadow' session with freenx client, qtNX?I don't see any options in that particular client to 'attach' or 'shadow' a current X11 session. Does anyone have a slackbuild for nomachines NX client?

View 2 Replies View Related

CentOS 5 :: LDAP Cache Shadow Passwords?

Oct 26, 2009

I'd like to allow my laptop to be disconnected from the network and login with a user stored on LDAP. I know nscd can cache usernames and groups but not shadows, but is there a solution that will cache passwords?

View 1 Replies View Related

Debian Multimedia :: No Shadow Under Gnome Panels / Compiz

Nov 8, 2010

Although "Shadow Windows" is set to "any" in CCSM I get no shadow under gnome panels. I tried adding (any) & class=Gnome-panel, but this does neither do anything at all. I'm using Debian Sid amd64, Compiz 0.8.4, X 1.7.7. Video card: ATI Radeon HD4570.

View 12 Replies View Related

Ubuntu :: Give All Of Text In Gnome A Drop Shadow?

Jul 2, 2010

Is there any way to give all of text in gnome a drop shadow?

View 6 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved