Unix script, Operating System

Assignment Help:

As a group, you may need to make some enhancements to your development server (NOT your stable server!)  It needs to be able to run the makepasswd program, which may require installing a package with aptitude.  Other modifications may be necessary as well, depending on your solution to this part of the assignment.  If you do any of the work in making sure that this stuff is working for your group, be sure to log it with plod (the logging happens on your stable server, even though the work is being done on your development server).

Automating account creation -- Write a script called "create_user" which will will create a user account that will work with a group of other accounts. The user ID, unencrypted password, and a group name must be provided on the command line.  Your script should:

1.Create the user account, with the primary group being named the same as the user (as usual). It should have a standard home directory.
2.Change the user's .profile so that it sets their umask to make all created files and directories readable by everyone and writable by group (as well as by owner).
3.Create a group from the group name, and add the user to it as a secondary group for that user
4.Create a directory in /home for the group, named with the group name.  Make it owned by the root user and the group.  Make it so that any file created in this directory will be owned by the group as well.
5.It should do all these things without any interactive input.  All input should be provided by the values on the command line when the script is run.


Related Discussions:- Unix script

Define segmentation, Define Segmentation  The memory allocation method...

Define Segmentation  The memory allocation method subject to “external” fragmentation is Segmentation.

Read-write locks, Consider a large web-based database. In some sense, Googl...

Consider a large web-based database. In some sense, Google is sort of like this. There might be many users who want to read from the database, but only a few users who are allowed

Explain page-replacement algorithms, Q. Consider the following page-replac...

Q. Consider the following page-replacement algorithms. Rank the algorithms on a five-point scale from "bad" to "perfect" according to their page-fault rate. Detach those algorithm

Define secondary memory, Define secondary memory. This memory holds tho...

Define secondary memory. This memory holds those pages that are not there in main memory. The secondary memory is usually a high speed disk. It is called as the swap device, an

Explain segmentation hardware?, Explain segmentation hardware? We defin...

Explain segmentation hardware? We define an completion to map two-dimensional user-defined addresses into one-dimensional physical addresses. This mapping is affected by means

Define page stealing, Define Page stealing    Page stealing is taking ...

Define Page stealing    Page stealing is taking page frames another working sets

Define deadlock avoidance, Define deadlock avoidance. An alternative me...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to need additional information about how resources are to be requested. Every request requires the sy

Define coding in an independent service architecture, Define Coding in an i...

Define Coding in an independent service architecture Coding in an independent service architecture alleviates many of the traditional dependencies of monolithic applications.

Lru implementation details, Now, let us discuss two related algorithms for ...

Now, let us discuss two related algorithms for deciding which pages to evict. The clock algorithm is one of the most popular choices. It works by keeping frames in a circular struc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd