Displaying 5 results from an estimated 5 matches for "vigr".
Did you mean:
migr
2003 Jun 19
4
WinXP can`t log on Samba PDC
...upport = yes
workgroup = workgroup
[public]
path = /tmp
guest ok = yes
writeable = yes
EOF
I already made the changes on regedit in my WinXP box.
this is how vipw looks like:
gino:x:500:500::/home/gino:/bin/bash
R32$:x:1200:300:workstation:/dev/null:/bin/false
this vigr:
gino:x:500:
R32:x:1200:
workstation::300:
2006 Feb 02
2
SV: usernames with capitals
...existing users, I'd add them in
> > lowercase, then edit
> > /etc/passwd
> > /etc/shadow
> > /etc/group
> > /etc/gshadow
> > and mv the /home/ directory to names you want (making sure
> > everything matches).
>
> You might choose to use vipw and vigr to edit the above files as well.
>
> If you use local mail spools, you will need to rename /var/spool/mail/user
> to /var/spool/mail/USER
That's actually a different problem and a good reason by itself
not to ever use uppercase in a user login name. Mailers on
unix-like systems usu...
2002 Jun 05
1
using "@group_name" in smb.conf
Hi all,
I need to give a group of users access to a file share that I am sharing
via samba.
In smb.conf I am using something similar to;
[accts]
comment = Accounts Dept Share
path = /usr/local/share/accounts
valid users = @accounts
public = no
writable = yes
printable = no
create mask = 0765
The valid users line says who can access this share: "@accounts".
I
2005 Feb 26
0
mac questions: stopping root from reading /home && mac_biba stops clean shutdown
...a + mls
Mathias
P.S.: bsdextended does not block root from anything, right??
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCIJBgSnKsATEFgwERAk+TAJ9tpmGVlY7W+OcIxj9q4vGqfTTkkgCfTWmK
0/myndlVB1DTfXAFHkxht5g=
=vIgR
-----END PGP SIGNATURE-----
2011 May 09
30
XCP: Insecure Distro ?
Hello mailing list!
I have been working with XCP a little bit, and I have the impression
that this distro is insecure. First, it does not look like update
repositories are enabled inside /etc/yum.repos.d, although I''m from an
apt background so I may be misinterpreting that. Where will my
security updates come from?
Next, it appears that the root password hash is directly stored inside