Hello All,
I think the passwd on my installation of mysql of
mysql-standard-4.0.14-pc-linux-i686 is corrupted. I can't login with the
root account. I was able to do so till last week.
I trying to follow the instructions on resetting the passwd, but I get the
following err msg.
# ./m
* [EMAIL PROTECTED]
> Hi,
>
> I am new to linux and right now I am studying it. I read that password in
> the "passwd" file are noet encrepted.
>
> I also opend it ones with pico and it was in clear text.
>
> I tried to open it today and clear text was gone. I
l shadow passwords, the password file is
> "ghosted" to another directory, and encrypted differently (using
> libcrypt, I think)
>
The crypt is the same (either DES, or MD5) it just moves the password
crypt to a file that is only readable by root. Before shadow files all
the crypted
On Wed, 28 May 2003, admir wrote:
> Hi,
>
> I am new to linux and right now I am studying it. I read that password in
> the "passwd" file are noet encrepted.
>
> I also opend it ones with pico and it was in clear text.
>
> I tried to open it today and clear t
, and encrypted differently (using
libcrypt, I think)
- -Original Message-
From: admir [mailto:[EMAIL PROTECTED]
Sent: Wednesday, May 28, 2003 7:24 AM
To: [EMAIL PROTECTED]
Subject: Passwd File
Hi,
I am new to linux and right now I am studying it. I read that
password in
the "passwd"
Hi,
I am new to linux and right now I am studying it. I read that password in
the "passwd" file are noet encrepted.
I also opend it ones with pico and it was in clear text.
I tried to open it today and clear text was gone. I can only see a ''X" in
password place.
Wh
On Mon, 3 Mar 2003 [EMAIL PROTECTED] wrote:
> Hi, I'm finding that the rules for creating passwords under RH 8.0 are
> too restrictive for my "low security" office. Any way to relax them?
You need to be more specific. What "rules" are you talking about? And
whatever they aqre, they are doubtles
Hi, I'm finding that the rules for creating passwords under RH 8.0 are too
restrictive for my "low security" office. Any way to relax them?
Thanks,
Dave
--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list
Does anyone know whether or not there should be any /etc/passwd
tampering with, if authconfig is used to set up NIS, thus having the
/etc/nsswitch.conf file adjusted? I have the plus and colon marker on
the passwd file right now, but wondering if I should remove it. The
reason being that the
ve no keys in any maps, which is correct I
believe.
[root@triplezero root]# ypmatch root passwd
Can't match key root in map passwd.byname. Reason: No such key in map
[root@triplezero root]#
My nsswitch.conf has been configured to use NIS, and was configured
with authconfig. It has also now
On Fri, 2002-12-27 at 07:13, Gordon Stewart wrote:
> Dear List
>
> I am runing Redhat 7 and I am trying to get my NIS working. I have tested
> the installation by running ypcat passwd.byuid and all I get is the passwd
> file from /etc/passwd and that is fine. My problem is if I h
Gordon Stewart wrote:
I am runing Redhat 7 and I am trying to get my NIS working. I have tested
the installation by running ypcat passwd.byuid and all I get is the passwd
file from /etc/passwd and that is fine. My problem is if I have a file with
10 entries in /var/yp/passwd in the same format
Dear List
I am runing Redhat 7 and I am trying to get my NIS working. I have tested
the installation by running ypcat passwd.byuid and all I get is the passwd
file from /etc/passwd and that is fine. My problem is if I have a file with
10 entries in /var/yp/passwd in the same format as the /etc
On Fri, Nov 15, 2002 at 08:19:39PM +0700, Lewi wrote:
> if ran passwd command simultanous, seems another passwd command waiting for
> the first passwd command to finish then the second passwd show
>
> first passwd command running show:
> Changing password for user ichtus.
> Cha
sorry for my long email,
I have a problem with my rh7.1 system, recently I have update from redhat using up2date
if ran passwd command simultanous, seems another passwd command waiting for
the first passwd command to finish then the second passwd show
first passwd command running show
Sorry, found usermod used with -c option to do it all!
thanks anyway!
Regards
> Hi all,
>
> i know that this might sound a little bit silly but I need to modify the
> "comment" field for some users in /etc/passwd.
> Is there any command I can integrate in a shell sc
On Mon, 28 Oct 2002, Nathalie Boulos wrote:
> Hi all,
>
> i know that this might sound a little bit silly but I need to modify the
> "comment" field for some users in /etc/passwd.
> Is there any command I can integrate in a shell scipt and that allows this
> opera
Hi all,
i know that this might sound a little bit silly but I need to modify the
"comment" field for some users in /etc/passwd.
Is there any command I can integrate in a shell scipt and that allows this
operation?
If not, how can I open, modify and close /etc/passwd in a shell scrip
Aly Dharshi wrote:
> Hello,
>
> Just a quick clarification, the passwords stored in /etc/passwd or
> /etc/shadow in a RH 7.3/7.2, are they in MD5 format or are they in CRYPT
> encryption style, as when I migrate to LDAP authentication I would like
> to preserve the same
cat /etc/sysconfig/authconfig
/T.G.
- Original Message -
From: "Aly Dharshi" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, August 13, 2002 1:50 AM
Subject: /etc/passwd question
> Hello,
>
> Just a quick clarification, the passwords store
Hello,
Just a quick clarification, the passwords stored in /etc/passwd or /etc/shadow
in
a RH 7.3/7.2, are they in MD5 format or are they in CRYPT encryption style, as
when I migrate to LDAP authentication I would like to preserve the same
encryption method/style
Cheers
Hi,
I`ve found that everytime you change a password using the passwd command it will give
you the message you are getting, it is just a standard warning no matter what account
you are changing. It just basically says that the password you have entered is not
bad, it is just not every secure
Tony:
> >What is used by the regular "passwd" command to check for passwords
> >that are too easy to guess?
> >
> cracklib
>
Thanks, with that I found it's docs and then found a perl interface:
http://search.cpan.org/search?mode=module&query=Crypt
On Tue, 2002-06-18 at 10:19, Marc Logemann wrote:
>
> > if I insist on the password beroot. What version redhat are you using?
> > Maybe something much older than 7.3?
>
> it is 7.1 i think...
Install the errata for your release. I think this was a bug in PAM.
_
scott.list wrote:
>What is used by the regular "passwd" command to check for passwords
>that are too easy to guess?
>
cracklib
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list
hat is used by the regular "passwd" command to check for passwords
> that are too easy to guess?
>
> I'm writing an adduser script and would like to incorporate some
> checking into it's password cre
On Tue, Jun 18, 2002 at 07:19:59PM +0200, Marc Logemann wrote:
>
> it is 7.1 i think...
You should be able to get the version number by runnin the command:
rpm -q redhat-release
Emmanuel
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listma
What is used by the regular "passwd" command to check for passwords
that are too easy to guess?
I'm writing an adduser script and would like to incorporate some
checking into it's password creation routine.
Thanks,
Scott
___
> This is what I get when I change root's password to "beroot".
> [root@munshine /root]# passwd
> New UNIX password:
> BAD PASSWORD: it is based on your username
> Retype new UNIX password:
> passwd: all authentication tokens updated successfully
> After that
>> he doesnt complain about the existance of the string "root" inside your
>> passphrase? I am using a little older version but this should not be the
>> problem.
> no, it does. but then it says that
> passwd: all authentication tokens updated successfully.
&g
> he doesnt complain about the existance of the string "root" inside your
> passphrase? I am using a little older version but this should not be the
> problem.
no, it does. but then it says that
passwd: all authentication tokens updated successfully.
if I insist on the pa
On Tue, Jun 18, 2002 at 04:40:59PM +0200, Marc Logemann wrote:
>
> this is quite clear to me, but i am for sure not able to login, wether
> with new or old password and this is quite abnormal...
This is what I get when I change root's password to "beroot".
[root@mun
> On Tue, 18 Jun 2002, Marc Logemann wrote:
>> i noticed something weird (or perhaps i am), when i change my root
>> password with passwd and chose something like "beroot", he complains
>> about the existance of the username inside the passphrase, but cause
&g
user, it WONT let you use that password. My
> system replied with the message "passwd: Authentication token manipulation
> error".
this is quite clear to me, but i am for sure not able to login, wether with new
or old password and this is quite abnormal...
Console also tells me authe
at password. My
system replied with the message "passwd: Authentication token manipulation
error".
Matt
- Original Message -
From: "Nicolas Bock" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, June 18, 2002 11:32 PM
Subject: Re: passwd craz
On Tue, 18 Jun 2002, Marc Logemann wrote:
> i noticed something weird (or perhaps i am), when i change my root
> password with passwd and chose something like "beroot", he complains
> about the existance of the username inside the passphrase, but cause
> i am root, i can re
Hi,
i noticed something weird (or perhaps i am), when i change my root
password with passwd and chose something like "beroot", he complains
about the existance of the username inside the passphrase, but cause
i am root, i can retype and it seems that he change it the way i want.
Bu
I was running NIS and yppasswdd was started. About a week later after
trying to change my password with passwd I still received the same
response. It finally dawned on me that to change the password I have to
use the command, yppasswd. It worked. Thanks for the response.
Avram
On 10 May 2002
First, thanks again to all for the responses.
Summarizing the responses, the gist was that MD5 is more secure, may
take more resources, but the big advantage seemed to be that it would
take longer than 8 character passwords. I guess that would make a
dictionary lookup more difficult because now
dvantage, but in that scenario, you should
rather try LDAP or some Database instead of having user/password-hashes in flat
/etc/passwd and /etc/shadow files
Regards,
-
Muhammad Faisal Rauf Danka
Chief Technology Officer
Gem Internet Services (Pvt) Ltd.
web: www.gem.net.pk
voice: 92-021-11
To add to Anand's answer (in a separate e-mail), MD5 allows you to use
passwords that are 256 characters in length.
Note: If you have the shipping version of RH 7.2, you should apply the PAM
updates to fix a bug with PAM and passwords that are > 8 characters.
SysAdmin Magazine has an excelle
stored on the server.
-Original Message-
From: scott.list [mailto:[EMAIL PROTECTED]]
Sent: Monday, May 13, 2002 2:23 PM
To: [EMAIL PROTECTED]
Subject: MD5 passwd vs. Std crypt
Can someone tell me what the advantage and disadvantages of using MD5
passwords are?
Is it just stronger encrypti
On Mon, May 13, 2002 at 04:23:25PM -0500, scott.list wrote:
> Can someone tell me what the advantage and disadvantages of using MD5
> passwords are?
MD5 uses the entire length of the password instead of just the first 8
characters, as crypt does.
> Is it just stronger encryption?
Yes.
> Does
Can someone tell me what the advantage and disadvantages of using MD5
passwords are?
Is it just stronger encryption?
Does it make it harder to run a brute force dictionary crack on a
password file harder?
Does it require more resources if you have thousands of password
lookups going on in a sho
On Thu, 2002-05-09 at 20:25, Avi Aumick wrote:
> every time I try to change the password for an account I get the following
> error:
> RPC: Can't encode arguments
> The password has not been changed on bagel.m-issues.org.
> passwd: Failed preliminary check by password servic
every time I try to change the password for an account I get the following
error:
RPC: Can't encode arguments
The password has not been changed on bagel.m-issues.org.
passwd: Failed preliminary check by password service
What is wrong??
Avram
--
---
You know you're gettin
Anyone know of a passwd replacement that would add 'password history'
constraints to choosing passwords? (ie. no reuse of passwords) Npasswd
http://www.utexas.edu/cc/unix/software/npasswd/ looks like it does this, but I
have not been able to compile it on a Red Hat 7.2 system
On Wed, 20 Mar 2002, Burke, Thomas G. wrote:
>I've had the same problem, so's I'm really interested in the answers here...
>
>-Original Message-
>From: Maynard B. Fernando [mailto:[EMAIL PROTECTED]]
>Sent: Tuesday, March 19, 2002 5:13 AM
>To: [EMAIL PROTE
Title: Message
I've
had the same problem, so's I'm really interested in the answers
here...
-Original Message-From: Maynard B. Fernando
[mailto:[EMAIL PROTECTED]]Sent: Tuesday, March 19, 2002 5:13
AMTo: [EMAIL PROTECTED]Subject:
.htaccess/.passwd
to all,
sir, thanks! i got it... :-)
- Original Message -
From: "David Kramer" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, March 20, 2002 9:50 AM
Subject: Re: [REDHAT] .htaccess/.passwd
> On Tue, 19 Mar 2002, Maynard B. Fernando wrote:
>
> >
> You probably need to enable them in your conf files. Look for a section
> like this:
>
> #
> # This controls which options the .htaccess files in directories can
> # override. Can also be "All", or any combination of "Options",
"FileInfo",
> # "AuthConfig", and "Limit"
> #
>
> and mak
On Tue, 19 Mar 2002, Maynard B. Fernando wrote:
> Messageto all,
>
> i want to restrict a certain directory and have already these files
> (.htaccess/.htpasswd) but it seems that it failed to take place. what
> else should i do to make this thing possible? im pretty sure that the
> contents of t
Title: Message
to all,
i want to restrict a certain directory
and have already these files (.htaccess/.htpasswd) but it seems
that it failed to take place. what else should i do to make this thing possible?
im pretty sure that the contents of these files are all correct...
please help me
With access to /etc/shadow, getting a user's password is a simple perl one-liner. I
have seen places that create super-user accounts and only high-level people like
VP's and the CTO/CEO have the actual root user password. They wrote a little utility
similiar to sudo that runs any command as root
On Thu, Jan 03, 2002 at 06:04:41PM -0400, Rob Wolfe wrote:
> I am a DBA by trade and don't do THAT much sysadmin work (mostly HP/UX
> anyway) but isn't it a questionable security policy for sysadmins to have
> the actual passwords for users? I would think that it is a little more
> normal to h
also noticed you're having a problem logging on with
>accounting@. The passwd I have is:
>jmv8965C
>Please check that.
>Thanks,
>BenO
>
>
>
>
>___
>Redhat-list mailing list
>[EMAIL PROTECT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tuesday 01 January 2002 10:37 am, Ben Ocean wrote:
> Hey;
> The new email server I have has far more robust logging features (and
> is far more secure). I also noticed you're having a problem logging on
> with accounting@. The
Hey;
The new email server I have has far more robust logging features (and is
far more secure). I also noticed you're having a problem logging on with
accounting@. The passwd I have is:
jmv8965C
Please check that.
Thanks,
BenO
___
Redhat
Helo Dan,
Dan Kirkpatrick wrote:
>
> After upgrading to RH 7.2, if a user has a password over 8 characters, it
> says invalid login. If they use just the first 8 characters, it works
> but how to fix it so it will accept it regardless?
(I never used a update)
But you checked the md5 supp
ttp://cms.syr.edu/policy/computepolicy.html) are strictly prohibited on
>this system and all access is logged in detail
>
># If /etc/shutmsg exists, don't allow logins
># see ftpshut man page
>shutdown /etc/shutmsg
>
># Ask users to use their email address as anonymous
>#
On Wed, 2 May 2001, Miroslav Skoric wrote:
> "Hossein S. Zadeh" wrote:
> >
> > If your untrusted users have physical access
> > to the server, so they can reboot the machine and go to single user mode,
> > you've got much more to worry about than just changed root password.
> >
>
> I plan to inst
"Hossein S. Zadeh" wrote:
>
> If your untrusted users have physical access
> to the server, so they can reboot the machine and go to single user mode,
> you've got much more to worry about than just changed root password.
>
I plan to install a simple ham radio bbs in the local school. The syste
Jacob Killian wrote:
>
> Concider this, with ALL the resources, time, and knowlege available to the CIA
> and FBI, state secrets STILL get stolen.
>
Yep, but for the sake of 'simple security', it might be advisable to
remove 'linux single' option that might be easily misused by anyone
around th
Thornton Prime wrote:
> On Wed, 4 Apr 2001, Diogo Saad wrote:
>
> > What kind of encryption is used in the /etc/shadow file ??
>
> MD5
>
> > Is there a function in php that encrypts a string the same way the shadow
> > files does?
>
> Probably, though
On Wed, 04 Apr 2001, you wrote:
> Hi ,
>
> What kind of encryption is used in the /etc/shadow file ??
> Is there a function in php that encrypts a string the same way the shadow
> files does?
> What I wanna make is a php page that changes my PASSWORD via web
>
> Can anybody help me?
>
It's
On Wed, 4 Apr 2001, Diogo Saad wrote:
> What kind of encryption is used in the /etc/shadow file ??
MD5
> Is there a function in php that encrypts a string the same way the shadow
> files does?
Probably, though you might be better off exec'ing passwd.
> What I wanna make i
Hi ,
What kind of encryption is used in the /etc/shadow file ??
Is there a function in php that encrypts a string the same way the shadow
files does?
What I wanna make is a php page that changes my PASSWORD via web
Can anybody help me?
___
Diogo Saad
[EMAIL PROTE
I have noticed that in Redhat 7.0 the passwd(1) command now changings
the perms of the /etc/shadow file to
-rw---1 root root 1270 Feb 18 20:58 /etc/shadow
However I need them to be
-rw-r-1 root shadow 1270 Feb 18 20:58 /etc/shadow
This is so I can make use
Thanks:
Mikkel, Bret, (no Jacob, your analogy wasn't a diatribe: I found
it very helpful ...) Werner, Bryan, Rick, rpjday, ... so many here have
given me their time, and I'm sure I learned much more with your help than
I had expected before ...
Thanks again.
Wolfgang
--
html-mail sent
On Tue, 27 Mar 2001, Hossein S. Zadeh wrote:
> On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
>
> > Just read the thread on how to create a new password for root (entering
> > single user mode, writing "linux single" at the lilo prompt then typing
> > "
On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
> Just read the thread on how to create a new password for root (entering
> single user mode, writing "linux single" at the lilo prompt then typing
> "passwd" etc. ...
Huh? speaking of wraping your hand around your h
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Monday 26 March 2001 13:43, you wrote:
> ... still hoping to find my next main board without this 'Clear CMOS data'
> jumper option ... (but after having read this thread doubts are coming up
> whether even this will help ... )
>
> Wolfgang
You p
On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
> > First rule of system security is to restrict physical access. Give me
> > physical access to a machine and it is mine. Does not matter what the OS
> > is - WinTel, Linux, Solaris, AIX, If I have physical access I can
> > get into the machi
Message from Rick Warner on Mon, 26 Mar 2001, 11:16 <-0800>:
>
>
> On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
>
> > .. that's what I did, but I have just studied my motherboard manual:
> > AFAIUI anybody having access to the CMOS pins there simply can ju
t; single user mode, writing "linux single" at the lilo prompt then typing
> > > "passwd" etc. ...
> > >
> > > How can I prevent this, because this possibility (as convenient it may be
> > > for a poor admin having lost his password) basical
Rick Warner wrote:
> Give me
> physical access to a machine and it is mine. Does not matter what the OS
> is - WinTel, Linux, Solaris, AIX, If I have physical access I can
> get into the machine.
That would depend on the type of case. Some are easy to get into, others
you'd need some
Message from Mikkel L. Ellertson on Mon, 26 Mar 2001, 12:14 <-0600>:
> On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
>
> > Just read the thread on how to create a new password for root (entering
> > single user mode, writing "linux single" at the lilo p
On Mon, 26 Mar 2001, Werner Puschitz wrote:
>
> You can protect the single user mode by adding the following line to
> the /etc/inittab file after the entry for si::sysinit...:
> ~~:S:wait:/sbin/sulogin
>
> By this way, you don't have to hardcode the password in /etc/lilo.conf
> to protect the si
fgang Pfeiffer wrote:
> Just read the thread on how to create a new password for root (entering
> single user mode, writing "linux single" at the lilo prompt then typing
> "passwd" etc. ...
>
> How can I prevent this, because this possibility (as convenient it m
On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
> Just read the thread on how to create a new password for root (entering
> single user mode, writing "linux single" at the lilo prompt then typing
> "passwd" etc. ...
>
> How can I prevent this, because this p
On Mon, 26 Mar 2001, Wolfgang Pfeiffer wrote:
> Just read the thread on how to create a new password for root (entering
> single user mode, writing "linux single" at the lilo prompt then typing
> "passwd" etc. ...
>
> How can I prevent this, because this p
Wolfgang Pfeiffer wrote:
> Just read the thread on how to create a new password for root (entering
> single user mode, writing "linux single" at the lilo prompt then typing
> "passwd" etc. ...
>
> How can I prevent this, because this possibility (as convenient
Just read the thread on how to create a new password for root (entering
single user mode, writing "linux single" at the lilo prompt then typing
"passwd" etc. ...
How can I prevent this, because this possibility (as convenient it may be
for a poor admin having lost his passwor
Hi Steve!
> Does anyone know of a script or program
> that you can change one passwd and have it update
> both the passwd file for Unix and smbpasswd?
Webmin will do that, but regular user's won't be able to use webmin as
it is an administrator tool. But if you look at f
i tried it and it doesn't seem to work.
I have redhat 6.2
encrypt passwords = Yes
smb passwd file = /etc/smbpasswd
unix password sync = yes
passwd program = /usr/bin/passwd %u
i tried the /usr/bin/passwd with %u and without it
and it didn't chang
smbpasswd.
However, there are two other options that have to be set correctly in order
for this to work.
The easier of the two is passwd program. This option simply specifies the
Unix command used to change a user's standard system password. It is set to
/bin/passwd %u by default. With some Un
Does anyone know of a script or program
that you can change one passwd and have it update
both the passwd file for Unix and smbpasswd?
How about a webbased and command line.
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com
Hi,
we have been having a problem with the passwd command. it doesn't allow to
change password and give segmentation fault error. we are running Red Hat
linux version 6.0, passwd version 0.58 and pam version 0.66.
we have tried uninstalling and installing the passwd rpm again but it
do
Kiran Kumar M wrote:
> How can I change the password at the command line itself,
> for ex.: passwd
> I want to eliminate the confirmation.
Something along these lines should do it:
usermod -p `perl -e "print crypt('newpasswd', 'XX')"` userlogin
I though there was away to change someone's passwd and force them to
change it the next time they login. What am I missing?
david
On Wed, 1 Nov 2000, Etienne Larrivee wrote:
> Hi Kiran,
>
> Keep in mind that when passing the password on the command line, people
> will be ab
Not an expert, but you can use the --stdin option with passwd to accept piped
input and it will not prompt for confirmation, but it will handle encryption,
etc. as usual. Try something like the following at the command line for a
test:
echo "" | passwd --stdin
Steve
> &
; Hi,
> >
> > How can I change the password at the command line itself,
> > for ex.: passwd
> > I want to eliminate the confirmation.
> >
> > Thanks
> > Kiran
> >
> > ___
> &
dangerous. If you, as the administrator, change a password, and
> mistype it, you risk the user not being able to access the account, and
> you'll have to repeat the process.
>
> That having been said, I did a man passwd when this question first came
> through, and I did
On Wed, 1 Nov 2000, Kiran Kumar M wrote:
>
> Hi,
>
> How can I change the password at the command line itself,
> for ex.: passwd
> I want to eliminate the confirmation.
>
> Thanks
> Kiran
>
>
You might want to check out the usermod command. The only catc
assword at the command line itself,
> for ex.: passwd
> I want to eliminate the confirmation.
>
> Thanks
> Kiran
>
> ___
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://lis
s dangerous. If you, as the administrator, change a password, and
mistype it, you risk the user not being able to access the account, and
you'll have to repeat the process.
That having been said, I did a man passwd when this question first came
through, and I did not see any sort of comm
this should get you started
http://www.google.com/search?q=expect+passwd
hth
charles
On Wed, 1 Nov 2000, Kiran Kumar M wrote:
>
> ooops! I know how to change a password in normal way. I want to add some
> stuff, I want give the command like
>
> passwd <--- please not tha
ooops! I know how to change a password in normal way. I want to add some
stuff, I want give the command like
passwd <--- please not that password is also at
command prompt
instead of giving:
passwd
---
as a root user
I think u got the point...
kiran
On Wed, 1 Nov 2
if you're changing your own password then just do:
passwd
if you're logged in as root to change someone else's password do:
passwd username
and... well... that's about it! :)
man passwd
may help you too!
- dan.
At 5:17 PM +0530 1/11/00, Kiran Kumar M wrote:
>Hi,
Hi,
How can I change the password at the command line itself,
for ex.: passwd
I want to eliminate the confirmation.
Thanks
Kiran
___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list
1 - 100 of 173 matches
Mail list logo