catpw(1) General Commands Manual catpw(1)Name
catpw - prints all password entries
Syntax
catpw
Description
The command prints password entries for all users known to the system using the format in Password entries are gathered from all sources
including Yellow Pages, Kerberos, and
See Alsogetpwent(3), passwd(5)catpw(1)
Check Out this Related Man Page
group(5yp)group(5yp)Name
group - group file in a Yellow Pages environment
Description
For each group, the file contains:
Group name
Encrypted password
Numerical group ID
Comma-separated list of all users allowed in the group
This is an ASCII file. The fields are separated by colons. Each group is separated from the next by a new-line. If the password field is
null, no password is needed.
This file resides in the directory. Because of the encrypted passwords, it can and does have general read permission and can be used, for
example, to map numerical group ID's to names.
A group file can have a line beginning with a plus (+), which means to incorporate entries from the Yellow Pages. There are two styles of
+ entries: All by itself, + means to insert the entire contents of the Yellow Pages group file at that point; +name means to insert the
entry (if any) for name from the Yellow Pages at that point. If a + entry has a password or group member field that is not null, the con-
tents of that field will override what is contained in the Yellow Pages. The numerical group ID field cannot be overridden.
Examples
+myproject:::bill, steve
+:
If these entries appear at the end of a group file, then the group myproject will have members bill and steve, and the password and group
ID of the Yellow Pages entry for the group myproject. All the groups listed in the Yellow Pages will be pulled in and placed after the
entry for myproject.
Restrictions
The command will not change group passwords.
Files
ULTRIX file system group file
Yellow Pages group map
See Alsoyppasswd(1yp), setgroups(2), crypt(3), initgroups(3x), passwd(5yp)group(5yp)
<h1>A short history of UNIX</h1>
<p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell
Laboratories, which is the research arm of the giant American corporation ATT. He and many
colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu.
In other words is there kind of an equal Linux with Unix?
Also what do I need to... (10 Replies)
I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)