Generate the special login script

Assignment Help Operating System
Reference no: EM13328079

Design and implement the disableuser.sh script.

Required script functionality:

disableuser.sh -v : prints the script version number and exits
disableuser.sh -h : prints help content and exits
disableuser.sh <username> : Disables (locks), but does not remove the specified user account => user cannot use disabled account for login
disableuser.sh -m <username> <'message'> : Does not disable login (by the operating system), but changes the user's login shell to a script that just writes the quoted message to standard output and then exits

Example results:

o whoami -> student1

o disableuser.sh -m user1 'You have been terminated'

o su user1 -> 'You have been terminated'

o whoami -> student1

Your disableuser.sh script will have to:

o Generate the special login script that incorporates the quoted message

o Configure user account to use the special login script

 

Reference no: EM13328079

Questions Cloud

Examine the unique characteristic of technology and internet : Examine the unique characteristics of the technology and the Internet. Evaluate the ways in which these characteristics have changed modern businesses.
How much will be paid for the life insurance policy : A Life Insurance Co. is offering you a policy that will pay you and your heirs $10,000 per year forever, with the first payment coming 25 years from today. If the interest rate is 5%, how much will you pay for the policy
Sam consumes green eggs and ham : 4. Sam consumes green eggs and ham. Ham and green eggs are both normal goods.
Design and implement the removeuser.sh script : Packs all files (not just those in the user's home directory) belonging to into single compressed archive named
Generate the special login script : Design and implement the disableuser.sh script. Generate the special login script that incorporates the quoted message.
Identified three potential market opportunities : The manager of a global opportunities for a U .S. manufacturer, who is considering expanding sales into Europe. Your market research has identified three potential market opportunities:
Explain lithium-silver chromate : Heart pacemakers are often powered by lithium-silver chromate "button" batteries. The overall cell reaction is: 2 Li(s) + Ag2CrO4(s) ? Li2CrO4(s) + 2 Ag(s) The overall cell potential is 3.5V. What is the half-cell potential for the follow half rea..
Design and implement the disableuser.sh script : disableuser.sh -m : Does not disable login (by the operating system), but changes the user's login shell to a script that just writes the quoted message to standard output and then exits.
What is the implied expected rate of return for company x : A friend comes to you with the following information on company X. He tells you that the company has price to earnings ratio (P0/E1) of 16 and a dividend payout ratio (D1/E1) of 40%.

Reviews

Write a Review

Operating System Questions & Answers

  Compare and contrast the two varieties of distribute os

Compare and contrast the two varieties of distrubted operating systems discussed in this chapter: a process-based DO/S and an object-based DO/S.

  Creating programs to compute

Compare zero-, one-, two-, and three-address machines through writing programs to compute X = (A+B X C)/D - E X F)

  Create an array that stores in integers from the keyboard

create an array that stores in integers from the keyboard and then I can scan that array to check numbers in order, if the number I check is greater than the previous then I will set the next number in the array to the higher value.

  Power management settings in bios

Every day at 2PM a client's computer at work reboots itself. You have made sure the power management settings in the BIOS and in the Windows Control Panel are not responsible.

  What is file system reliability

What is file system reliability and explain the roles of error handling, back up, and file checker methods in supporting the file system reliability?

  Network security methodology and technology

Explain the network security methodology and technology used in your organization and recognize any additional controls needed.

  Identify the differences in the code samples

Coding style is a very important part for those entering the technology field. Here are two model Java programs that do exactly the same thing according to the user.

  Network design question

Bench Fitness Centers has 8- i ndividual  locations in this area. Most of the centers have the similar equipment and provide the same services,

  What is the predication about of the next run time?

1). An aging algorithm with a = 1/2 is used to predict run times. The previous four runs, from oldest to most recent, are 30, 10, 20, 40 msec. what is the predication about of the next run time? You may use regular arithmetic or binary with bit shift..

  Relational database architecture from a network

Determine what would make a corporation or organization migrate to a relational database architecture from a network or hierarchical architecture?

  A typist is entering text on a keyboard

A typist is entering text on a keyboard at the rate of 30 words per minute. If each word is 6 characters long on average, how many bits per second are being sent to main memory? A space is also a character. Assume that each word is followed by one sp..

  Personal or home use of linux

The paper shall only address business requirements and concerns, not personal or home use of Linux.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd