General :: What Is The Purpose Of Having "/etc/shadow" File

May 15, 2010

we can save the users password in /etc/password file itself.then why a special file /etc/shadow is created to save the encripted password of users.

View 2 Replies


ADVERTISEMENT

General :: Purpose Of /etc/crontab File?

Jun 7, 2010

I attempted to run various cron jobs as root - just general server make-tidy stuff. But if I edit the /etc/crontab file directly, these tasks don't get run. However, if I use crontab -e as root, these jobs appear to work. Any idea why this might be the case? Also, I understand that user cron jobs are stored in /var/spool/cron/<user> (including root). If this is the case, what's the purpose of the /etc/crontab file?

View 5 Replies View Related

General :: What Is The Purpose Of Using Hard Links Instead Of Being A Shortcut To Some File

Mar 23, 2011

what is the purpose of using hard links instead of being a shortcut to some file ?

View 5 Replies View Related

General :: Shadow File Password Policy?

Oct 1, 2010

Today i was going through some of security guides written on linux .Under shadow file security following points were mentioned.1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.2)Usernames in shadow file must satisfy to all the same rules as usernames in /etc/passwd.3)password for application Username should display * if username is not locked.4)If a user is locked it should be displayed as ! as the first character in second field of shadow file.

Confusion for point 1 and 2:Now i m confused as why the encrypted password should be more than 14-25 characters.Also what rules to satisfy How to check it?Confusion for point 3 and 4:There are lot of users with * as second field i guess they are not locked but according to 4th point there are lot of users with ! as first characters.How would i check whether they are actually locked or not.I m posting the output of /etc/shadow and /etc/passwd files for the account.

View 11 Replies View Related

General :: What Encryption Does The /etc/shadow File Use For Passwords

Nov 26, 2009

I am just wondering what encryption method the shadow file uses, so that I may be able to manually change it. I ask this because I am trying to make a web page that will allow people to change their linux password via a browser.

View 4 Replies View Related

General :: Deleted Root From Passwd And Shadow File

Oct 7, 2010

I deleted root from passwd and shadow file.Can I crate a new root user?

View 1 Replies View Related

General :: Grep All Values Other Than Encrypted Password From /etc/shadow File?

Jan 14, 2010

I would like to grep all values other than encrypted password from /etc/shadow fileFor example,each line consists of 8 fields separated with :/The only thing that I want not to print out is the contents between first : and second : (encrypted password)

View 7 Replies View Related

CentOS 5 :: Purpose Of Fs.file-max In /etc/sysctl.conf?

Jul 29, 2010

On a production Centos 5.3 system, I want to raise the hard & soft limits of open file handles from 1024 -> 8192 (not a "biggie", I'd think) Right now, "sysctl -a | grep file" shows fs.file-max=463144 (a default, I'd guess) I'm guessing file-max is the maximum number of open file handles on the system, vs the per-user limits seen with "ulimit -Hn" and "ulimit -Sn". Right? If so, I shouldn't think I'd have to touch this on a server with few users.

Also, after doing a lot of reading, I still don't understand the mentions of needing to also add: "session required pam_limits.so" to /etc/pam.d/loginor adding "session required /lib/security/$ISA/pam_limits.so" to /etc/pam.d/system-auth Maybe I've gotten off into the deep weeds in goggling about raising file handle limits.

View 1 Replies View Related

Debian :: How /etc/shadow File Authenticates An User ?

Feb 9, 2011

i am new to debian. I need to know after booting sequence login shell appears to get username and password. so what happens when user puts username and password ?? how this given username and password are matched with /etc/shadow file ??

my another question is what is role of /etc/pam.d/ authenticating username and password ?? does it work with shadow file or not ?

View 3 Replies View Related

Ubuntu :: Manually Generate An Entry In The /etc/shadow File?

Oct 25, 2010

I'm trying to learn how to create a user account manually on the system, and I've edited the /etc/passwd and /etc/groups as well as creating a new home directory by copying /etc/skel but I'm stuck at how to generate an entry in the /etc/shadow file since it comprises of the hash and all?

View 4 Replies View Related

Security :: Shadow File Readable - MD5 Password Exposed

Jun 7, 2010

I noticed that our /etc/shadow file is readable on a patch I released for one of our in house linux boxes a while back ago. Could they use it to gain access the root account etc? Our passwords are all MD5 encrypted.

View 5 Replies View Related

Programming :: Replace A Hash In A Shadow File Not Using Passwd?

Aug 5, 2010

What is the easiest way to replace a hash in a shadow file for one particular user, not using passwd, and when the current password is unknown?

View 3 Replies View Related

Server :: Adding Entries Directly In Password Shadow File

Mar 11, 2011

I am working on building a customized ISO image of a server based on linux. The thing is after the server is installed and run for the first time, three users have to be created for the various services to run properly. I want this to be automated. To achieve this what is was thinking is automatically enter the user entries in the /etc/passwd and /etc/shadow files through init scripts when the server starts for the first time after the installation. I tried creating user and assigning password in one of my machine, and the /etc/passwd and the /etc/shadow entries of this user I copied it into the other machine and tried login in on the other machine and everything worked fine. How I am trying to achieve this.

View 1 Replies View Related

Server :: Changes Happened In /etc/shadow File, When User Changing Password?

Jan 24, 2011

I want to know, how does changes happened in the encrypted password in /etc/shadow file , when user changing password . because user doesnot have access on that file

View 1 Replies View Related

Fedora Security :: Generating Password Hashes Compatible With FC11/sha-512 Shadow File?

Jul 3, 2009

I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)

View 3 Replies View Related

General :: What Is Purpose Of Makefile In Nis Server

Aug 17, 2010

can anybody tell the use of make file in Nis server.

View 1 Replies View Related

General :: What Is Purpose Of Bash Scripting?

May 15, 2010

What is the purpose of bash scripting? Is it just for file manipulation?

View 4 Replies View Related

General :: What's The Purpose Of A Boot Partition?

Jan 17, 2010

I've always been confused about this issue of boot partitions. In the past when I install linux I usually have 2-3 partitions.

1. Main OS partition mounted on /
2. Storage partition mounted on /home
3. Swap partition

Why and when would I need to have a boot partition? Even if I dual boot two OSs, I just make one more partition for that other OS. So what's the purpose of a boot partition?

View 5 Replies View Related

General :: Purpose Of Shebang In Scripts?

Oct 15, 2009

Can you explain me what is purpose of shebang in scripts? I have noticed that my scripts will run without shebang. i.e. When i save my crontab file it says that scripts will be executed in i.e. /bin/sh shell. So, what is the point if I put #!/bin/ksh at the start of script?

View 8 Replies View Related

Ubuntu :: What's The General Purpose Compressing Format

Jan 14, 2010

I have a folder that may contain text documents, pictures, MP3s, video clips, all sorts of stuff. Supposing that, within reason, I'm not too bothered how long it takes to compress and uncompress them. And suppose I don't care if it's free or open source (well, has to be free as in beer). What's the best compression format/algorithm (whatever it is that I install in Synaptic and choose from the drop down menu in the compression tool) I should use?

View 9 Replies View Related

Ubuntu :: Best General Purpose Language To Learn?

Jun 19, 2010

The last time I wrote code for anything was about 15 years ago using Turbo Pascal. I would like to get back into it, most likely to create some mobile apps or enhance web sites. What is the best general purpose language to learn? And what is a good method for learning, preferably free?

View 1 Replies View Related

Ubuntu :: Creating A General Purpose Switch?

Apr 19, 2011

I want to create a general switch that I can use to send a signal to my ubuntu server when it is activated/deactivated. Here's an example: I want to know when a certain door is open, so I can have a switch closed when the door is closed and opened when the door is opened. When opened or closed, the computer will receive a signal and I can have some software intercept this signal and process it to my liking (i.e. ring a bell/text message me/email me/etc).

I know I will have to create a simple driver, software to make use of this signal, etc... I am willing to do whatever it takes to make it happen. I'm just wondering if anyone can point me in the right direction as far as which interface I should use to communicate with my server (i.e. usb, serial), which references I should read, and any personal experience you have with something like this...

View 3 Replies View Related

General :: Purpose Of Libc In An Operating System?

Jun 24, 2010

What is the purpose of libc in an operating system?

Is the libc is common for all OS or it is different for different OS!?

I mean source of libc build for RH is same for Ubuntu !?

View 2 Replies View Related

General :: Logrotate - Purpose Of Rotate And Postrotate?

Jul 10, 2010

I have been trying out in learning with logrotate command and logrotate configuration file )logrotate.conf custom logfile for an process is 'test.log'

Code:

#cat /etc/logrotate.d/test
/var/log/test.log {
rotate 4

[code]....

whenever the log file (test.log) exceeds 100M a new file will be created with the file name as test.'date'.'gz'(new file is created with a current date and in a compressed format of gz) and also with permission mentioned above). I really dont know what is the role of rotate( will this be carried on only for next 4times i mean upto 400MB; (4times*file reaches 100MB)? and also what could be the purpose of postrotate?

View 5 Replies View Related

General :: What's Difference And Purpose For Console And Terminal

Sep 21, 2010

I'm confuse about different beetwen console and terminal in linux system? And what purpose them for?

View 5 Replies View Related

General :: What Are Advantage Of Getting Into Single User Mode Or Its Purpose?

May 10, 2009

What good does getting into single user mode do?And what's the basic purpose of it , i.e is it maintaining purpose???

View 2 Replies View Related

General :: Editing Windows 7 Bootloader For Sharing Purpose

Oct 26, 2010

"Life has been made easier with all Microsoft systems, all versions of Dos and Windows, because each of them has to be installed in an active primary partition and so hence will always has a boot loader in the root partition." So if I already have Windows 7 installed (in a 100gig partition of a 1t hdd) how do I modify the windows booting process so that I can go on to create many additional partitions that will be used for linux distros?

View 7 Replies View Related

General :: Normal For /etc/shadow To Change It's Timestamp?

Aug 1, 2010

I noticed that file /etc/shadow changed it's timestamp.Why it is changed? Is it "normal"?

View 4 Replies View Related

General :: Converting A String To An Shadow Password Format

Apr 15, 2010

I need to manually convert an string ( like with echo ) to a DES crypt format to be inserted inside a /etc/shadow file, does anybody knows how can I do that?

Maybe there are some little tool that could handle that operation, well.. I don't know, hope someone can give me a hint on that.

View 3 Replies View Related

General :: Create Shadow Pasword Hash Manually?

Oct 14, 2010

How to create the password hash exactly the same as in shadow file (from the command line)?

The command
openssl passwd -crypt
returns something different.

View 6 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved