Fedora :: Shadow On My Desktop
Apr 7, 2011There's some sort of shadow on my right desktop. No idea how it got there and it persists through reboots.
View 2 RepliesThere's some sort of shadow on my right desktop. No idea how it got there and it persists through reboots.
View 2 RepliesI upgraded to F14 from F13, and when the process was complete, I noticed on my desktop, I have a strange drop shadow on the left-hand corner. As if it's shadowing an invisible window. You cannot interact with it, it's not "really" there.It is very annoying, and I can not figure out what it is, or what is causing it. I've checked all my plasma widgets and things like that, but it still persists.
Anyone run into this before or have any ideas?Here is a screenshot showing the shadow, I intentionally set my background to white, so you could see it best. But it shows up on top of any wallpaper. and you can clearly see it underneath translucent term windows/etc.
I recently mashed the passwd, shadow, gshadow, group files in my Fedora 12 installation. I was dumb and didn't take a copy of the originals and all I have is the originals from a Fedora 11 installation.
View 2 Replies View RelatedHas anybody been able to get NX (Nomachine) running on Fedora 10 configured using a shadow session of the local desktop (X11-local). I am experiencing some kind or cookie creation error, perhaps privilege related?
FYI. Normal unix-kde sessions work fine (e.g. Giant on Box) and shadow sessions of an existing unix-kde session works fine too. A shadow session of the local display is a bust.
Here's the error log:
Code:
NX> 203 NXSSH running with pid: 4076
NX> 285 Enabling check on switch command
NX> 285 Enabling skip of SSH config files
NX> 285 Setting the preferred NX options
[Code]....
1- how I can deactivate selinux and the root password on fedora 15?
2- I can't use copy, cut past in the GUI !!
3- even with (su -) I can't modify files like shadow or config !
I'm learning to configure tftp-server and using vi editor - google search not helpful at least what comes up first - maybe different in Fedora ?
[url]
Code:
But . . . vi editing etc/shadow I get . . . E45: 'readonly' option is set (add ! to override)
In INSERT MODE - do I add ! as !wq instead of :wq as I found in google search (that's NOT working) - - or - do I add ! on the line to set tftp server password to * -or - what?
This is weird, today I updated my system and while trying to visudo from single user mode got
"cannot read /etc/shadow: Permission denied"
which kept me from doing anything until I switched to file permissions of 400 on shadow, then back. Is this being experienced by anyone else or just me? /etc/security/limits.conf doesn't seem like it wants to change in enforcing mode either and I can't find any alerts to provide clues on the situation.
I'm trying to setup ssh access on my Fedora 12 laptop. I get the following error message in /var/log/secure when I try to login from another machine using ssh and the login is denied:
Code:
sshd[3025]: error: Could not get shadow information for <user>
sshd[3025]: Failed password for <user> from <ip> port <port> ssh2
If I do a 'setenforce 0' I can login and no error is logged.
I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)
View 3 Replies View RelatedThe shadow that is meant to appear under the bar at the top of the screen in unity seem to be overlaying on top of itself every time and eventually turned black
View 3 Replies View Relatedgetting a black shadow below the taskbar recently in ubuntu 11.04. anybody got an idea how to fix it?
View 5 Replies View RelatedIn what cases would a user appear in /etc/shadow and not /etc/passwd
View 2 Replies View RelatedI am moving my Linux server from Suse 10 to Ubuntu 9.04 and I moved the significant parts of /etc/shadow, /etc/passwd, and /etc/group over to Ubuntu 9.04. I am not able to login into the computer with the old accounts. The only problem I see is that the old accounts use Blowfish and DES to encrypt the passwords in /etc/shadow, and Ubuntu uses SHA512. If I change the passwords, the accounts will work. However; I have about 300 accounts to move, and I don't want to do that to all of them. I have tired Ubuntu Forums and talked to every linux expert I know, and no one has an answer.
View 7 Replies View RelatedI get used to have shadow for tooltip window in my desktop environment. But from Ubuntu 10.04, the defaut setting disables shadow for tooltip. And I don't feel good about such minor change.So how to enable shadow for tooltip window again? (ubuntu 10.04 + gnome 2.30)
View 1 Replies View RelatedI deleted Windows from my Notebook and am only rockin Ubuntu on this machine. On the (previously) shared Data Partition, there are dozens of GBs occupied by the Volume Shadow Copy Service backups (which I used with Windows) but now how do I get rid of these?In Windows you could either turn off VSS/Restore under System Protection or alternatively use the Disk Cleanup Utility. How do I do this with Ubuntu?
View 6 Replies View RelatedHere at work we've made very good use of Server 2003's Shadow Copy service, which lets me restore users' files quickly and easily using the Previous Versions software--yet takes minimal resources and storage space on the server. I've also heard that the service may be available to users in Windows 7. Is there an equivalent of this in Ubuntu? Something I could set up that would snapshot files on my hard drive every so often, and let me recover deleted files or earlier versions of files?
View 1 Replies View RelatedI'm using this metacity theme along with the included (and AMAZING) emerald theme for the window borders. Just wondering if there's any way I can keep the window borders as they are, but put shadows on for the gnome-panel and my stickynotes? See HERE.When I try to adjust the shadow settings in emerald, it changes everything -- including the window borders, which make the theme look horrible.I know I can specify certain types and classes of windows when using compiz as default window decorator with ccsm, but is there any way to do something like this with emerald?
View 3 Replies View Relatedi use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..
how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method
i am new to debian. I need to know after booting sequence login shell appears to get username and password. so what happens when user puts username and password ?? how this given username and password are matched with /etc/shadow file ??
my another question is what is role of /etc/pam.d/ authenticating username and password ?? does it work with shadow file or not ?
I noticed that file /etc/shadow changed it's timestamp.Why it is changed? Is it "normal"?
View 4 Replies View RelatedToday i was going through some of security guides written on linux .Under shadow file security following points were mentioned.1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.2)Usernames in shadow file must satisfy to all the same rules as usernames in /etc/passwd.3)password for application Username should display * if username is not locked.4)If a user is locked it should be displayed as ! as the first character in second field of shadow file.
Confusion for point 1 and 2:Now i m confused as why the encrypted password should be more than 14-25 characters.Also what rules to satisfy How to check it?Confusion for point 3 and 4:There are lot of users with * as second field i guess they are not locked but according to 4th point there are lot of users with ! as first characters.How would i check whether they are actually locked or not.I m posting the output of /etc/shadow and /etc/passwd files for the account.
I am just wondering what encryption method the shadow file uses, so that I may be able to manually change it. I ask this because I am trying to make a web page that will allow people to change their linux password via a browser.
View 4 Replies View RelatedThe /etc/shadow file contains an id of $1$, $2$, $5$ or $6$ to show the encryption method used.A salt follows this,followed by the password hash.When a user is created and a password is set, a hash is RANDOMLY generated and used as the salt to the password hash. Everytime that user logs in, login checks /etc/shadow for the $id$ and salt and runs the password given by the user through the hash mechanism ($id$) using the salt in /etc/shadow.So basically does login look at /etc/shadow for the $id$ and salt to create a hash with which to compare to the /etc/shadow hash?question 2 - If my $id$ was $5$, which is sha256, how would i go about changing this? Like is there a shadow.conf or crypt.conf or something? Can i change it per user?
View 2 Replies View RelatedI need to make a backup of the ldap (users and passwords). Is there a tool to do this? I've found o the internet only the shadow to ldap version
View 1 Replies View RelatedI am trying to use John the Ripper but it doesn't take regular MD5 hashes, only shadow MD5 hashes. For example this hash: 900150983cd24fb0d6963f7d28e17f72 (which, decrypted, is 'abc') within a text file, John the Ripper does not detect because it is not shadow format. How can I convert this MD5 hash into shadow format?
View 1 Replies View RelatedI've been working on this console-based game (in c) in which the player walks around touches floating orbs which do things etc. And I want to make it so that an object on the map blocks the sight of the player, which is something I haven't tried until now. This is the part of the code which handles this sort of thing :
void uncover(int shadow)
{
int wp,
hp,
xp,
yp,
pp, // point placement
mp, // maximum pp value // (that's what she said)
lp; // light placement .....
This <works> but isn't very nice. What I would like to do is to change the third to last if statement, which is really more of a geometry problem, which could be frased as :
given points (x,y) , (plist[pp].x,plist[pp].y) and (wp,hp) create a conditional which tests weather or not point (wp,hp) is within the shadow cast by light-source (x,y) being blocked by an object at (plist[pp].x,plist[pp].y), [with some width, ~1]
but there isn't a geometry forum, and it's somewhat more related to programming.
Does anyone know how to do a 'shadow' session with freenx client, qtNX?I don't see any options in that particular client to 'attach' or 'shadow' a current X11 session. Does anyone have a slackbuild for nomachines NX client?
View 2 Replies View RelatedI'd like to allow my laptop to be disconnected from the network and login with a user stored on LDAP. I know nscd can cache usernames and groups but not shadows, but is there a solution that will cache passwords?
View 1 Replies View RelatedAlthough "Shadow Windows" is set to "any" in CCSM I get no shadow under gnome panels. I tried adding (any) & class=Gnome-panel, but this does neither do anything at all. I'm using Debian Sid amd64, Compiz 0.8.4, X 1.7.7. Video card: ATI Radeon HD4570.
View 12 Replies View RelatedIs there any way to give all of text in gnome a drop shadow?
View 6 Replies View Related