Question

In: Computer Science

1. Create customized versions of the /etc/login.defs and /etc/default/useradd files in order to meet the new...

1. Create customized versions of the /etc/login.defs and /etc/default/useradd files in order to meet the new user account criteria you provide.

2. Research online for various Linux utilities that can be used to store and sort various Linux log files. Have them share their findings with the class.

Solutions

Expert Solution

You can use useradd -r or –system options to create a system account. There is no difference between a system user and a normal user, only system users will be created with no aging information in /etc/shadow, and their numeric identifiers are chosen in the SYS_UID_MIN-SYS_UID_MAX range, defined in /etc/login.defs, instead of UID_MIN-UID_MAX (and their GID counterparts for the creation of groups). Also, for system user useradd will not create a home directory, regardless of the default setting in /etc/login.defs (CREATE_HOME). You have to specify the -m options if you want a home directory for a system account to be created.
You can use useradd -M or –no-create-home options to disable home directory creation even if the system wide setting from /etc/login.defs (CREATE_HOME) is set to yes.
You can use useradd -K or –key KEY=VALUE options to overrides /etc/login.defs defaults (UID_MIN, UID_MAX, UMASK, PASS_MAX_DAYS and others).
You can use useradd -U or –user-group options to create a group with the same name as the user, and add the user to this group. The default behavior (if the -g, -N, and -U options are not specified) is defined by the USERGROUPS_ENAB variable in /etc/login.defs.
You can use useradd -g or –gid GROUP options to add the user to an existing group. -g options accept both group name or number of the user’s initial login group. If not specified, the behavior of useradd will depend on the USERGROUPS_ENAB variable in /etc/login.defs. If this variable is set to yes (or -U/–user-group is specified on the command line), a group will be created for the user, with the same name as her loginname. If the variable is set to no (or -N/–no-user-group is specified on the command line), useradd will set the primary group of the new user to the value specified by the GROUP variable in /etc/default/useradd, or 100 by default.
You can use useradd -N or –no-user-group options to not create a group with the same name as the user, but add the user to the group specified by the -g option or by the GROUP variable in /etc/default/useradd. The default behavior (if the -g, -N, and -U options are not specified) is defined by the USERGROUPS_ENAB variable in /etc/login.defs.

Related Solutions

1.  In order to meet new Homeland Security guidelines, the Eagles install new facial recognition technology that...
1.  In order to meet new Homeland Security guidelines, the Eagles install new facial recognition technology that can instantly identify all patrons entering Lincoln Financial Field.  Installing the new security system costs the team $150 million.  Once installed, it is essentially costless to operate.  Use the appropriate economic framework to derive the impact of installing this system on ticket prices to Eagles games.
Create a new folder called CSCI130_A3_yourname. Create all of the files indicated below within this folder....
Create a new folder called CSCI130_A3_yourname. Create all of the files indicated below within this folder. For this assignment you will be creating a total of 2 classes that meet the definitions below. This assignment will allow the user to enter in the coefficients for a polynomial function of degree 2. The user will then be asked to enter a number. The program will use that number as an argument to the function, and will print the corresponding function value....
Management of Sycamore Home Furnishings is considering acquiring a new machine that can create customized window...
Management of Sycamore Home Furnishings is considering acquiring a new machine that can create customized window treatments. The equipment will cost $263,400 and will generate cash flows of $85,000 over each of the next six years. If the cost of capital is 12 percent, what is the MIRR on this project? (Round intermediate calculations to 3 decimals and final answers to 1 decimal places, e.g. 15.5%. Do not round factor values.)
Management of Wildhorse Home Furnishings is considering acquiring a new machine that can create customized window...
Management of Wildhorse Home Furnishings is considering acquiring a new machine that can create customized window treatments. The equipment will cost $226,550 and will generate cash flows of $64,750 over each of the next six years. If the cost of capital is 12 percent, what is the MIRR on this project? (Round intermediate calculations to 3 decimals and final answers to 1 decimal places, e.g. 15.5%. Do not round factor values.)
Question 1 Download the files Book.java and BookInfo.txt from Content->Chapter 12 Quiz Files. Create a BookDriver.java...
Question 1 Download the files Book.java and BookInfo.txt from Content->Chapter 12 Quiz Files. Create a BookDriver.java class with a main method. In the main method, create an ArrayList of Book objects, read in the information from BookInfo.txt and create Book objects to populate the ArrayList. After all data from the file is read in and the Book objects added to the ArrayList- print the contents of the ArrayList. Paste your BookDriver.java text (CtrlC to copy, CtrlV to paste) into the...
1. Explain 3 Versions of EMH; Implications:Technical vs Fundamental Analysis; Activeversus Passive Portfolio Management, etc. 2....
1. Explain 3 Versions of EMH; Implications:Technical vs Fundamental Analysis; Activeversus Passive Portfolio Management, etc. 2. Discuss behavioral biases(covered in lecture)and the impact on investment performance;give examples for each bias; explainprospect theory and what behavioral biases it will lead to.
1 -​Create the code to generate a default web page. The contents of this page should...
1 -​Create the code to generate a default web page. The contents of this page should be Your​​Name, right justified
1. Create a new Problem 1 worksheet and build up the Economic Order Quantity (EOQ) model...
1. Create a new Problem 1 worksheet and build up the Economic Order Quantity (EOQ) model as discussed in the slides. Use the following values for the model variables: Annual Demand: 105,000 Cost Per Unit: $27.38 Holding Costs: 7.5% Ordering Costs: $273.00 Make sure that your model calculates the Unit Holding Costs, EOQ and Orders to Place per Year. 2. Create a new Problem 2 worksheet and build up the Earned Value Management (EVM) model as discussed in the slides....
Objectives: Use class inheritance to create new classes. Separate class definition and implementation in different files....
Objectives: Use class inheritance to create new classes. Separate class definition and implementation in different files. Use include guard in class header files to avoid multiple inclusion of a header. Tasks: In our lecture, we wrote a program that defines and implements a class Rectangle. The source code can be found on Blackboard > Course Content > Classes and Objects > Demo Program 2: class Rectangle in three files. In this lab, we will use class inheritance to write a...
1. What metadata can you find from image files, e.g. jpeg or jpg, bmp, TIFF etc....
1. What metadata can you find from image files, e.g. jpeg or jpg, bmp, TIFF etc. How can the metadata be helpful in Digital Forensics? Please retrieve the metadata from some photos you have and submit these photos and your answer. 2. Please briefly describe NTFS alternate data streams (ADSes).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT