A user is created in the RedHat installation system. It takes too long to change it to a short point. The modification method is as follows (all under root );
1. Modify the user'sLogin Name and logon directory, edit the/etc/passwd file, find your current user's entry, and modify it:
Newname: X: 500: 500:/home/newname:/bin/bash
2. Modify the username entry in/etc/shadow:
Newname: $1 $ cnry3oel $ zcuzip1q1x75prfwq. dkm1: 14983: 0: 99999: 7 :::
2.27linux and Windows Interop files: Use the command yum install-y lrzsz to install this toolLinux------(upload) Windows use commands: Sz needs to upload filesWindows---(upload) Linux use command: RZ3.1 User profile and password configuration filespasswd+ User: Modify the user's password/ETC/PASSWD and/etc/shadows are 2 of reusable files3.2 User
Typically, when a database is restored, a login name is added to the database.For example, the database backup file already contains the user ABC, now restore the database, and then found that the existing database does not have the ABC user, want to create a new ABC user, as the owner of the database, this problem occurs.http://blog.csdn.net/cjh200102/article/de
XenApp 6.5 Adds a user, which displays the following message: IMA server context Invalid user or groupWorkaroundRestart IMA (Citrix Independent managerment archiveture) service650) this.width=650; "title=" 1406107799896.jpg "src=" http://s3.51cto.com/wyfs02/M01/51/21/ Wkiom1ri9uuherybaadqjetgcge332.jpg "alt=" Wkiom1ri9uuherybaadqjetgcge332.jpg "/>This article is from the "Hongbifu" blog, make sure to keep t
This section is mainly about using scripts to build accounts in bulk#/bin/sh #这是脚本使用的命令, we're using the scripting language SH#authur: Arthur #作者#qq: 10000 #这是联系方式For num in ' seq 3 'DoUseradd $suerchars $numPasswd= ' date|md5sum|cut-c3-20 'echo "$passwd" |passwd--stdin $userchars $numEcho-e "User: $userchars $num\tpasswd: $passwd" >>/tmp/user.logSleep 1DoneEcho----------------------------------------Cat/tmp/user.log20161108l04-05 old boy Linux OPS tr
Problem:
Recently, I saw the username SX $ on the server. Later I learned that the username was hacked, but I could not delete it. The prompt is: the user cannot be deleted and the user does not belong to this group, what should I do?
Answer:
1. Run the regedt.exe Registry Editor in reged.exe, select HKEY_LOCAL_MACHINE → SAM, right-click it, select "permissio
Town Yard text:The Confucian School of the practical and practical, line Buddhism Purdue sentient beings, the monastic Kangsheng fidelity, understanding of the easy to change the image. To science and technology to shine a good law, the achievement of a conscience blog.______________________________________________________________________________________________________My system: Ubuntukylin 16.04 LTS 64bit650) this.width=650; "src=" Https://s4.51cto.com/wyfs02/M01/8D/FF/wKioL1iyy42hW3zkAABabntp
When you use Linux, you need to log in as a user, limiting the resources that a consumer can access, and groups are used to facilitate the organization's management of users.
Users and Groups
• Each user has a UserID• Each user belongs to a primary group, belonging to one or more subordinate groups• Each
Tag: Font timestamp modified hash account indicates ACK command is locked1.linux and Windows inter-pass filesXsheel supports Linux and Windows inter-pass1. need to install a software lrzsz on Linux Client2. after installation, you can use the command to cross-documentsz file name ---> transfer Linux files to WindowsRZ----> Select a file for Windows2. User-user Group
One, user filesFiles:/etc/passwdThis file records the user's user name, user ID, owning group, home directory, Shell information:[[email protected] ~]# tail-n3/etc/passwdruanwenwu:x:1003:1003::/home/ruanwenwu:/bin/ bashapache:x: apache:/usr/share/httpd:/sbin/:nologintest:x:1004:1004::/ Home/test:/bin/bashThis file is s
In the previous section, we learned about user and group. now, let's take a look at how to manage users and user groups. Related Management commands summary User management related commands useradd add user adduser add user passwd
# ID # Displays the ID of the current user and user group
# who shows user information for the current login system
#su change user identity
[root@localhost/] #su chenlly
[chenlly@localhost/]
#cat/ETC/PASSWD Archives Structure
Root:x:0:0:root:/root:/bin/bash
chenlly:x:1000
number, 1~499 reserved by the system, as a management account, the ordinary user's identification number starting from 500, if we customize the establishment of a normal user, You will see that the identification number of the account is greater than or equal to 500.4) Represents the group identification number, also called GID. This field corresponds to a record in/etc/
/ETC/PASSWD:The user's information is saved under/ETC/PASSWD (early in the day, the user's password is also placed in the file.) Later, for security reasons, place the password in/etc/shadow):/etc/group:The user group information is saved under/etc/group:/etc/shadow:The password information is saved under/etc/shadow:By ': ', the content of/etc/shadow is layered b
One, CentOS user rights related files1./etc/passwd (User rights information file)[User name]:[password placeholder]:[user id]:[Group id]:[user description Information]:[user home dir
Add a user to a user group and never use it directly: Usermod-g GroupaDoing so will allow you to leave the other user groups, just as members of this user group Groupa. Should be added with the-a option: usermod-a-G groupa
Tags: one cannot pass test own Usermod user app optionLinux add Users (user) to user groups (group)Add a user to a user group and never use it directly:Usermod-g GroupaDoing so will all
Linux, each file, folder has its own: the user, the user group belong to
The authority is also divided into three paragraphs
Ls-l can be viewed, rwx respectively: Read and write execution
For example: Ls-l get KKK directory: rwr-xr--x KKK KKK
This means that the KKK directory is allowed for the file owner KKK to be read and write, and is not writable for the
The user information created by/ETC/PASSWD will be displayed in this directory1th paragraph: User name2nd: Password, later placed in/etc/shadow3rd paragraph: UID4th paragraph: GID5th paragraph: General user is generally empty, can write explain explanation6th paragraph: Home directory7th paragraph: Shell/etc/shadow where the user's password exists①
Tags: 2.4.1 through JXL Association View encrypt actions run technology sharing1.Linux user Management, user type, authentication mechanism, user related profile 1.1 User and user groups concepts and user types
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.