On Tue, 2007-03-13 at 18:12 -0600, Doran L. Barton wrote:
> Not long ago, Chris Carey proclaimed...
> > You can specifically deny SSH logins to that account by editing
> > /etc/ssh/sshd_config
>
> See the DenyUsers directive in the sshd_config(5) man page.
The problem with DenyUsers is that it p
On Tue, Mar 13, 2007 at 04:46:37PM -0600, Kenneth Burgener wrote:
> I got around to trying this today, but when I run my program I get an
> error saying:
>
> [EMAIL PROTECTED] ~]# su -l myuser -c "/usr/myapp/myprogram"
> "This account is currently not available."
>
> Originally I created this u
On Tue, 13 Mar 2007, Kenneth Burgener wrote:
> I got around to trying this today, but when I run my program I get an
> error saying:
>
> [EMAIL PROTECTED] ~]# su -l myuser -c "/usr/myapp/myprogram"
> "This account is currently not available."
What are the reasons why sudo isn't the preferred al
Not long ago, Chris Carey proclaimed...
> On 3/13/07, Kenneth Burgener <[EMAIL PROTECTED]> wrote:
>
> >and all files created by 'myprogram' are created as the 'myuser'
> >program, which is what I wanted. But I wonder if having the 'myuser'
> >with a default shell (and no password) would be a secu
On 3/13/07, Kenneth Burgener <[EMAIL PROTECTED]> wrote:
and all files created by 'myprogram' are created as the 'myuser'
program, which is what I wanted. But I wonder if having the 'myuser'
with a default shell (and no password) would be a security hole, and
possibly allow someone to SSH to my
On Tue, 13 Mar 2007, Kenneth Burgener wrote:
I got around to trying this today, but when I run my program I get an
error saying:
[EMAIL PROTECTED] ~]# su -l myuser -c "/usr/myapp/myprogram"
"This account is currently not available."
Originally I created this user in /etc/passwd as follows:
m
Stuart Jansen wrote:
> On Fri, 2007-02-23 at 19:26 -0700, Kenneth Burgener wrote:
>> The closest command I have found would be running something like "su
>> -c " which runs the command as the specified user, but
>> when the command exits, I am still user root. I fear that it could be
>> hacked an
PLUG Users,
I bought the wrong kind of memory in haste at the the local cheap shop
and can't return it. I paid $85.52 on February 20, and would like to
sell it or trade it.
Re: trades, I'd like to have a small MP3 player(has to be able to play
192kbit VBR MP3 files), or a lightly used 2.5" lapt
I looked at the "follow tcp stream" function in wireshark. It didn't
help me much except for the fact that I could see some of the
certificate being sent.
I run top and watch the httpd processes. When I submit the form on
"page A" I use quickforms to process the data. Then the I use a
redirect