P D F - S E A R C H

Found 165 thsd. answers for '../../../etc/passwd'.

Adding New users | etc/passwd File
The /etc/passwd file. A list of users Consults at login time to determine a user’s UID and to verify the users’ password.

http://www.csl.mtu.edu/cs3451/www/notes/ch6%20-%20Adding%20new%20users.pdf

System uses many data files for normal | etc/passwd
/etc/passwd. ● Contains user information: ● user name (pw_name) ● encrypted password (pw_passwd, historical) ● user id (pw_uid) ● group id (pw_gid) ● home dir (pw_dir) ● default shell...

https://cs.gmu.edu/~mabdulla/563/slides/system-files.pdf

Survey
Splitting the le into two pieces – a readable /etc/passwd with all but the encrypted password present, and a ‘‘shadow password’’ le that is only readable by root is the solution proposed by Sun...

https://cs.gmu.edu/~csnow/library/unix/Klein_passwd.pdf

User Management
q /etc/passwd. • Store user information: Ø Login name Ø Encrypted password (* or x) Ø UID Ø Default GID Ø GECOS information.

https://nasa.cs.nctu.edu.tw/sa/2013/slides/03_User_Management.pdf

User Management
q /etc/passwd. • Store user information: Ø Login name Ø Encrypted password (* or x) Ø UID Ø Default GID Ø GECOS information.

https://nasa.cs.nctu.edu.tw/sap/2015/slides/User_Management.pdf

User Management | etc/adduser.conf
q /etc/passwd. • Store user information: Ø Login name Ø Encrypted password (* or x) Ø UID Ø Default GID Ø GECOS information.

https://nasa.cs.nctu.edu.tw/sap/2016/slides/User_Management_16101301.pdf

System
For historical reasons, /etc/passwd must be group readable. This is a BIG security hole. Shadow passwords were developed as a first attempt to make things more secure.

http://www.tech.its.iastate.edu/linux/linuxed/Sysadmin1/UserAdmin.pdf

LINUX Administrator’s | etc/group /etc/passwd /etc/shadow
encrypt passwords = yes smb passwd file = /etc/samba/smbpasswd. security = domain In this security mode, samba server must join to an NT domain (using net command) and authenticate users by a...

https://www.makeuseof.com/wp-content/uploads/2009/09/linuxsysadmin.pdf

User Authentication HOWTO | 2.1. /etc/passwd
The /etc/passwd file, which contains information about all users, including their encrypted password, is readable by all users, making it possible for any user to get the encrypted password of everyone on...

https://www.ischool.utexas.edu/mirrors/LDP/HOWTO/pdf/User-Authentication-HOWTO.pdf

UNIX Security: setuid and chroot
• Enables controlled access to system resources such as email, printers, etc. • 99% of local vulnerabilities in UNIX systems exploit setuid-root programs to obtain root privileges.

https://www.cs.utexas.edu/~shmat/courses/cs380s_fall09/09setuid.pdf