P D F - S E A R C H

Found 8 mln. answers for '../etc/passwd'[0]'.

Adding New users | etc/passwd File
The /etc/passwd file. A list of users Consults at login time to determine a user’s UID and to verify the Edit passwd and shadow files Set an initial password Create home directory For the user Copy...

http://www.csl.mtu.edu/cs3451/www/notes/ch6%20-%20Adding%20new%20users.pdf

Linux operating system, but can be used to
Unusual Accounts Look in /etc/passwd for new accounts, especially with UID 0 or GID Unusual Files Continued On a Linux machine with RPM installed (RedHat, Mandrake, etc.), run the RPM tool to...

https://appletree.or.kr/quick_reference_cards/Internet-Networking/Intrusion%20Discovery%20Cheat%20Sheet%20Linux.pdf

Solaris Administrator’s | etc/inet/protocols Network protocols.
/etc/resolv.conf Internet domain name, name server and search order. An example of resolv.conf domain mydomain.com nameserver 192.168.0.1 search mydomain.com.

https://appletree.or.kr/quick_reference_cards/Unix-Linux/Sun%20Solaris%20Administrator%27s%20Quick%20Reference.pdf

Securing Password Storage
etc/passwd. root:0:0:EC90xWpTKCo hjackman:100:100:KMEzyulaQQ2 bgoldthwa:101:101 qq Circa 1973 qq ‘one-­‐way’ password encryption qq chmod a+r /etc/passwd qq DES took 1 sec per password.

http://sconce.ics.uci.edu/134-W14/Securing-Password%E2%80%93Storage-RW.pdf

Managing User Accounts and User | Default passwd File
...etc/passwd and /etc/group entries, see Table 3, “Default passwd File Entries,” on page 22 and Password information is stored as follows: ■ In the passwd file when you are using NIS ■ In the...

https://docs.oracle.com/cd/E53394_01/pdf/E54800.pdf

Expanded Login Options During... | Default passwd File
Default passwd File. Fields in the shadow File. algorithm, which has been preserved for backward compatibility with any existing passwd file entries and NIS maps.

https://docs.oracle.com/cd/E36784_01/pdf/E36818.pdf

Commands
/etc/passwd. Source of home directories for ‘~name’. ATTRIBUTES See attributes(5) for descriptions of the following attributes

https://docs.oracle.com/cd/E19683-01/817-3936/817-3936.pdf

Cannot usually log in as root remotely | etc/passwd
the /etc/securetty ● Use su to promote yourself to superuser status. PAM (Pluggable Authentication Modules). ● Authentication schemes are varied and ever-changing.

https://courses.cs.washington.edu/courses/cse484/11au/sections/section6.pdf

Chapter 1. UNIX System Overview
Historically, the password file has been stored in /etc/passwd and has been an ASCII file. Each line contains the fields described in Figure 6.1, separated by colons.

http://poincare.matf.bg.ac.rs/~djenic/apue.pdf

Use the Command-Line Interface to | etc/passwd (continued)
/etc/passwd (continued). UID: •0–99 for the system itself •100–499 for special system users (such as – pwconv command converts the passwd file to the shadow file. • Replaces the password in...

http://cisweb.bristolcc.edu/~jca/cis133/PowerPoint/UserGroupPermission.pdf