unixstudent
Technical User
Greetings systems administrators,
For our assignments, my UNIX prof. thought it best to "network" w/ a community of sys admins and collect information on the various ways to do the same thing (such as backups can be done w/ tar of dump; or power downs may be done by shutdown, halt, etc). Your time is greatly appreciated. Keep in mind, this is for educational purposes and you will be helping a young UNIX student on his way to Guru-level. Please take 5-10 minutes of your time to respond to the following. Thank you!
1) How are user names for new users created?
2) What commands are used to add new users?
3) What processes are used to delete users? Under what circumstances?
4) How often are home directories moved for a user? How is this accomplished?
5) What approvals does a new user go through?
6) What happens when a user forgets his/her password?
7) What happens when a user's password has expired and the user wants the account reactivated?
8) How are the passwords maintained? How often do they expire?
9) What rules are imposed on users to ensure they create good passwords?
10) Is the /etc/shadow file used? Are there other measures taken to protect encrypted passwords from hackers/crackers? [sig][/sig]
For our assignments, my UNIX prof. thought it best to "network" w/ a community of sys admins and collect information on the various ways to do the same thing (such as backups can be done w/ tar of dump; or power downs may be done by shutdown, halt, etc). Your time is greatly appreciated. Keep in mind, this is for educational purposes and you will be helping a young UNIX student on his way to Guru-level. Please take 5-10 minutes of your time to respond to the following. Thank you!
1) How are user names for new users created?
2) What commands are used to add new users?
3) What processes are used to delete users? Under what circumstances?
4) How often are home directories moved for a user? How is this accomplished?
5) What approvals does a new user go through?
6) What happens when a user forgets his/her password?
7) What happens when a user's password has expired and the user wants the account reactivated?
8) How are the passwords maintained? How often do they expire?
9) What rules are imposed on users to ensure they create good passwords?
10) Is the /etc/shadow file used? Are there other measures taken to protect encrypted passwords from hackers/crackers? [sig][/sig]