Design and implement the disableuser.sh script

Assignment Help Operating System
Reference no: EM13328076

LINUX - UBUNTU Shell Script

Task 1 description: Design and implement the disableuser.sh script.

Required script functionality:

  • disableuser.sh -v : prints the script version number and exits
  • disableuser.sh -h : prints help content and exits
  • disableuser.sh <username> : Disables (locks), but does not remove the specified user account => user cannot use disabled account for login
  • disableuser.sh -m <username> <'message'> : Does not disable login (by the operating system), but changes the user's login shell to a script that just writes the quoted message to standard output and then exits

Example results:

o   whoami -> student1

o   disableuser.sh -m user1 'You have been terminated'

o   su user1 -> 'You have been terminated'

o   whoami -> student1

Your disableuser.sh script will have to:

o   Generate the special login script that incorporates the quoted message

o   Configure user account to use the special login script

 

Task 2 description: Design and implement the removeuser.sh script.

Required script functionality:

  • removeuser.sh -v : prints the script version number and exits
  • removeuser.sh -h : prints help content and exits
  • removeuser.sh <username> : Removes the user account from the system without removing any of the user's files.
  • removeuser.sh -z <username> <archivename> :
    • Disables (locks) the account username
    • Packs all files (not just those in the user's home directory) belonging to <username> into single compressed archive named <archivename>
    • Then, removes the user account

Reference no: EM13328076

Questions Cloud

Design and implement the removeuser.sh script : Packs all files (not just those in the user's home directory) belonging to into single compressed archive named
Generate the special login script : Design and implement the disableuser.sh script. Generate the special login script that incorporates the quoted message.
Identified three potential market opportunities : The manager of a global opportunities for a U .S. manufacturer, who is considering expanding sales into Europe. Your market research has identified three potential market opportunities:
Explain lithium-silver chromate : Heart pacemakers are often powered by lithium-silver chromate "button" batteries. The overall cell reaction is: 2 Li(s) + Ag2CrO4(s) ? Li2CrO4(s) + 2 Ag(s) The overall cell potential is 3.5V. What is the half-cell potential for the follow half rea..
Design and implement the disableuser.sh script : disableuser.sh -m : Does not disable login (by the operating system), but changes the user's login shell to a script that just writes the quoted message to standard output and then exits.
What is the implied expected rate of return for company x : A friend comes to you with the following information on company X. He tells you that the company has price to earnings ratio (P0/E1) of 16 and a dividend payout ratio (D1/E1) of 40%.
The quantity supplied and p is the price per lot of paper. : Qd=160,000-2000P Qs = 40,000+2000P MEC=.0006Qs. Qd is the quantity lots of paper Qs is the quantity supplied and P is the price per lot of paper.
Explain the half-cell potential for the follow half reaction : Heart pacemakers are often powered by lithium-silver chromate "button" batteries. The overall cell reaction is: 2 Li(s) + Ag2CrO4(s) ? Li2CrO4(s) + 2 Ag(s) The overall cell potential is 3.5V. What is the half-cell potential for the follow half rea..
Determine the size of the m1 money mulitplier : What would happen to the money supply if the reserve requirement increased to 14 percent while noncheckable deposits to checkable deposits fell to 35 percent. Assume the other ratios remain as orgiginally stated.

Reviews

Write a Review

Operating System Questions & Answers

  Operating model for the organization

Analyze a specific company to recognize their foundation for execution, including, and post your results, for example, the operating model for the organization.

  A spawned process

A spawned process may be destroyed automatically when its parent is destroyed, as one method; another design is to have spawned processes proceed independent of the parent

  Single table manipulation and table join manipulation

Explain one drawbacks and benefits of Internet enabled technology use by firms to augment information flow both within and between company departments, partners, and consumers?

  Provide the design and justification for your mechanism

Provide the design and justification for your mechanism that supports process dispatching and is operating system reliability and protection enhanced with the microkernel approach to system design?

  Friendly computer program

Consider of any computer related item that you felt was not user friendly to you? Did you feel reluctant to continue using it.

  Security of information and data in an organization

The final security measure my company implements well is monitoring internet usage through limiting the access for most workers to search websites that are not related to the company.

  Page fault with lru page replacement policy

Computer has 16 pages of virtual address space but only three physical pages frames. Initially physical memory is empty. Program references virtual pages in order 1,2,3,4,5,3,4,1,6,7,8,7,8,9,7,8,9,5,4,5,4,2 Which references a page fault with LRU ..

  Illustrate how many entries are there in logical address

Consider a computer system with 48-bit logical address and 4-KB page size. System supports up to 1 GB of physical memory. Illustrate how many entries are there in each of the following?

  A distributed file service

explain if 5 clients accessed the same file in a Distributed File Service how many copies of the file may exist on the network? List where the copies are.

  Roles of network managers

In Many development companies and universities network managers must oversee a network that has several computers connected to it that are used through developers for design and product development reason.

  A machine has a 32-bit address space and an 4-kb page

A machine has a 32-bit address space and an 4-KB page. Suppose a simple OS just boot up on the machine, running a single process. The process uses 2 memory pages for the text and data memory (combined) near the lowest virtual address, and 1 memory pa..

  Perform necessary error checking to ensure that a positive

Write a C program using the fork() system call that generates this sequence in the child process. The starting number will be provided from the command line. For example

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd