Countdown Timer Browser, Is Steven Gerrard A Catholic, Most Important Issues Facing America Today 2022, Umc Primary Care Physicians, Big Fire In Liverpool Today, Articles S

then i want th extract from the database by giving "select * from tablename where input = '123' We have an old audit process which involves someone manually using sam to generate user lists. The Apache HTTP Server", Collapse section "18.1. whats the command we have use on solaris for this? Checking Network Access for Incoming NTP Using the Command Line, 22.16.1. Mail Delivery Agents", Collapse section "19.4. Installing and Removing Packages (and Dependencies), 9.2.4. For numbers of cores/threads, I often do psrinfo -v | grep -c on-line which isn't the cleanest solution, but it's always worked for me. awk it should be very simple to fullfill your requires. More Than a Secure Shell", Collapse section "14.5. You can also see who previously logged into the system by typing the command last. Sandia National Laboratories Livermore, California Postdoctoral Research Fellows - Air Force Science & Technology Fellowship Program . Displaying Virtual Memory Information, 32.4. An Overview of Certificates and Security, 18.1.9.1. WINS (Windows Internet Name Server), 21.1.10. If you want to check the password expiration date for a specific user in Linux, use the following command: # chage -l daygeek Last password change : Feb 13, 2020 Password expires : May 13, 2020 Password inactive : never Account expires : never Minimum number of days between password change : 7 Maximum number of days between password change : 90 . command options that are specified and can include user, role, system login, UID. Black and White Listing of Cron Jobs, 27.2.2.1. Event Sequence of an SSH Connection", Expand section "14.2. Chipset information (information about various hardware controller cards on the mother boards, system BIOS versions, PCI firmware version etc..) /export/home/user (auto mount) System Monitoring Tools", Collapse section "24. users command in Linux system is used to show the user names of users currently logged in to the current host. The Default Postfix Installation, 19.3.1.2.1. Do new devs get fired if they can't solve a certain bug? Extending Net-SNMP", Expand section "24.7. Overview of OpenLDAP Client Utilities, 20.1.2.3. To see the new LUNs information. After you press enter at the prompt it'll also show you every uncommented line of smb.conf which can be useful . Additional Resources", Collapse section "C. The X Window System", Expand section "C.2. Administrative Rights in Securing Users and Processes in Oracle Additional Resources", Collapse section "29.11. Mail User Agents", Expand section "19.5.1. There are tons of literature on LDAP and queries, that explain how to search for groups, with examples. Enabling and Disabling SSL and TLS in mod_ssl, 18.1.10.1. I have written one shell script for GPRS route add is given below named GPRSRouteSet.sh The variable Securing Email Client Communications, 20.1.2.1. Please correct it if I'm missing something in it. //NODECOLORCODE "Exon 1" awk/sed newbie here. @SethMMorton I realise I made the issue sound worse than it usually is. Static Routes Using the IP Command Arguments Format, 11.5.2. Common Sendmail Configuration Changes, 19.3.3.1. Hi & email user list to admin in text file, how to change /export/home/user dir to /home /user in solaris, root user command in shell script execute as normal user, Solaris user account de-activated, command to activate again, Command to list all the VIP addresses assigned to Solaris server. FD800000 9768K rwxsR [ ism shmid=0xf ] . Configuring a Multihomed DHCP Server", Collapse section "16.4. Additional Resources", Expand section "20.1.1. 4 Updating or Upgrading an Oracle Solaris Image. Accessing Support Using the Red Hat Support Tool", Collapse section "7. Running the httpd Service", Expand section "18.1.5. $199.99. The Policies Page", Expand section "21.3.11. root role has this authorization. [1] 3 shell is a command-line shell program that provides convenience and productivity features to help both new and advanced users of the AWS Command Line Interface. Upgrading the System Off-line with ISO and Yum, 8.3.3. What's a Solaris CPU? The input will be a command- any command like ls/ pwd/ mv etc. Why is there a voltage on my HDMI and coaxial cables? Configuring rsyslog on a Logging Server", Expand section "25.7. X Server Configuration Files", Expand section "C.3.3. Serial number of the work Hello Setting Local Authentication Parameters, 13.1.3.3. Samba Server Types and the smb.conf File", Expand section "21.1.7. Using Your Assigned @BillMan, what does that even mean? Keyboard Configuration", Collapse section "1. It will display who is currently logged in according to FILE. Configure the Firewall for HTTP and HTTPS Using the Command Line, 18.1.13.1. Installing and Removing Package Groups, 10.2.2. Managing User Accounts and User Environments About User Accounts and User Environments, Where User Account and Group Information Is Stored, Commands for Obtaining User Account Information, Chapter 1About User Accounts and User Environments, What's New in Managing User Accounts in Oracle Solaris 11.2, Security Changes That Affect User Account Management, Guidelines for Assigning User Names, User IDs, and Group IDs, Commands That Are Used for Managing Users, Roles, and Groups, Bash and Korn Shell Environment Variables, Managing Users With Oracle Enterprise Manager Ops Center, Chapter 2Managing User Accounts by Using the Command-Line Interface, Task Map for Setting Up and Managing User Accounts by Using the CLI, Setting Up User Accounts by using the CLI, How to Customize User Initialization Files, How to Change Account Defaults For All Roles, How to Share Home Directories That Are Created as ZFS File Systems, Manually Mounting a User's Home Directory, Chapter 3Managing User Accounts by Using the User Manager GUI, Organization of the User Manager Dialog Box, Filtering the Information Displayed in the GUI, How to Set Filters for Default Name Service Type and Scope, Adding, Modifying, and Deleting Users and Roles by Using the User Manager GUI, How to Add a User or Role With the User Manager GUI, How to Modify a User or Role With the User Manager GUI, How to Delete a User or Role With the User Manager GUI, Assigning Advanced Attributes With the User Manager GUI, Assigning Groups With the User Manager GUI, Assigning Roles With the User Manager GUI, How to Assign Roles With the User Manager GUI, Assigning Rights Profiles With the User Manager GUI, How to Administer Rights Profiles With the User Manager GUI, Assigning Authorizations With the User Manager GUI, How to Assign Authorizations With the User Manager GUI. This information is stored in various files within the Serial number of the work. PID=$! Example-2: Change the password for the user named . In both cases you can find out by checking the logs. By clicking Accept all cookies, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Configuring the Services", Collapse section "12.2. Linux is a registered trademark of Linus Torvalds. Overview of Common LDAP Client Applications, 20.1.3.1. Using Fingerprint Authentication, 13.1.3.2. How do I tell if a file does not exist in Bash? You can find a description on the following link Sytem Accounting. Using The New Template Syntax on a Logging Server, 25.9. Configuring New and Editing Existing Connections, 10.2.3. In large organizations, having insight into who has access to the system is crucial to correctly add users, remove users, and assign new user privileges. Configuring a DHCPv4 Server", Expand section "16.4. On Solaris, it is a tool for writing to this table rather than a tool for reporting upon its contents. Configuring ABRT to Detect a Kernel Panic, 28.4.6. I also want to connect to another database "D2" The Apache HTTP Server", Expand section "18.1.4. By clicking Accept all cookies, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. Using fadump on IBM PowerPC hardware, 32.5. Man Pages, All Additional Resources", Collapse section "16.6. #!/bin/sh Configuring Kerberos Authentication, 13.1.4.6. Overview of OpenLDAP Server Utilities, 20.1.2.2. Additional Resources", Collapse section "B.5. Desktop Environments and Window Managers", Collapse section "C.2. Using and Caching Credentials with SSSD", Collapse section "13.2. Registering the System and Managing Subscriptions", Expand section "7. Using Kolmogorov complexity to measure difficulty of problems? Command Line Configuration", Collapse section "2.2. List samba shares and every connection (log, including user) that has been established to each of them. Message ID: 20220826141853.419564-7-deller@gmx.de (mailing list archive)State: New, archived: Headers: show Configuring Anacron Jobs", Expand section "27.2.2. Fuzzy auto-completion for Commands (e.g. Directories within /proc/", Expand section "E.3.1. Managing Log Files in a Graphical Environment", Expand section "27. The passwd files are the local source of password information. If no password is defined, use the command without the -p option. To learn more, see our tips on writing great answers. useradd -d/home/user -m -s /bin/sh user Using the ntsysv Utility", Expand section "12.2.3. How to check top 10 CPU Consuming Process in Solaris Well lets finish review of prstat command with bingo kind of options which will give you very clear idea what is happening with server.You will get top 10 CPU Consuming Process in Solaris. Accessing Support Using the Red Hat Support Tool", Expand section "7.4. A Troubleshooting Package Installation and Update. Relax-and-Recover (ReaR)", Collapse section "34.1. Informative, thorough, with extra comparative notes. Creating Domains: Primary Server and Backup Servers, 13.2.27. Date and Time Configuration", Collapse section "2. information about user accounts. The free Command The free command gives you a table of the total, used, free, shared, buffer/cache, and available RAM on your computer. Advanced Features of BIND", Expand section "17.2.7. Play Better. Managing Groups via Command-Line Tools", Expand section "3.6. Why are physically impossible and logically impossible concepts considered separate in terms of probability? Creating SSH Certificates", Expand section "14.5. This module differs from clamav_control as it requires a Unix socket to interact with. Increase visibility into IT operations to detect and resolve technical issues before they impact your business. Enabling the mod_ssl Module", Expand section "18.1.10. Running the Crond Service", Expand section "27.1.3. kstat -m cpu_info. Configuring OpenSSH", Expand section "14.2.4. Managing Users via the User Manager Application", Expand section "3.3. Displaying basic information about all accounts on the system, Example3.14. The XSCFU diagnoses and starts the entire server, configures domains, offers dynamic reconfiguration, as well as detects and notifies various failures. How will i do it Please advice. Creating SSH Certificates", Collapse section "14.3.5. Displays the roles that are assigned to a user. The database can be the local /etc/passwd file, or a I need to write a bourne shell script (solaris 10) that accepts input from the user. Solaris commands to retrieve chipset information I need to know what are the commands in Solaris to retrieve the below information about the hardware platform. There is no program supplied for reading it. For example, the following query will displya all attributes of all the users in the domain: ldapsearch -x -h adserver.domain.int -D "user@domain.int" -W -b "cn=users,dc=domain,dc=int". Configuring Smart Card Authentication, 13.1.4.9. hardware platform details, soalris, solaris, Solaris commands to retrieve chipset information, Retrieve information Text/Word from HTML code using awk/sed, Execute a C program and retrieve information, User cannot retrieve email once his /home directory was moved, how to retrieve only the Use% value from df command, A script pls( To retrieve database information). 5 Configuring Installed Images. Copyright 2002, 2014, Oracle and/or its affiliates. Installing and Upgrading", Expand section "B.3. Registering the System and Managing Subscriptions", Collapse section "6. Displaying a single piece of information without the heading, When administering users and groups on your system, you need a good tool to monitor their configuration and activity on the system. Prep Less. Here is how you can list users and groups on Linux. To learn more, see our tips on writing great answers. Using a Custom Configuration File, 13.2.9. Running Services", Expand section "12.4. SKumar. Separating Kernel and User-space Profiles, 29.5.2. Configuring ABRT", Expand section "28.5. Basic System Configuration", Expand section "1. When you've heard a command but aren't sure how to use it, checking. Mail Transport Protocols", Collapse section "19.1.1. 1. We then expand it (\u) as if it were a prompt string with the P operator. Just not sure how to. I'm logged in to an AIX box now and we need to do an audit on this box. How do I get the current user's username in Bash? Checking For and Updating Packages", Expand section "8.2. On Linux- Someone already answered this in comments. Using the Service Configuration Utility", Collapse section "12.2.1. Configure the Firewall Using the Command Line", Collapse section "22.14.2. Samba with CUPS Printing Support, 21.2.2.2. 2. A common question that most beginner MySQL users ask is "How do I see all of the users in my MySQL server?" Most of them assume that there is a show users command in MySQL, but there isn't one.This is a common mistake because there are other MySQL commands for displaying information about the database. Additional Resources", Expand section "II. The SSH Protocol", Expand section "14.1.4. Configuring rsyslog on a Logging Server", Collapse section "25.6. Why do you need bash as the interpreter? Using This Documentation. /etc/shadow is a text file that contains information about the system's users' passwords. I don't have smit Last Activity: 22 August 2017, 9:15 AM EDT, Last Activity: 11 September 2014, 8:50 AM EDT. Introduction to PTP", Collapse section "23.1. Basic Postfix Configuration", Expand section "19.3.1.3. Creating SSH Certificates for Authenticating Users, 14.3.6. Creating a New Directory for rsyslog Log Files, 25.5.4. Integrating ReaR with Backup Software", Collapse section "34.2. 2 Getting Information About Software Packages. Date/Time Properties Tool", Expand section "2.2. This will show you the last time the user tim logged in. To use the logins command, you must become an administrator who is assigned Configuring TLS (Transport Layer Security) Settings, 10.3.9.1.2. How do you get out of a corner when plotting yourself into a corner. Using Key-Based Authentication", Collapse section "14.2.4. Has 90% of ice around Antarctica disappeared in less than a decade? If the FILE is not specified, use /var/run/utmp. These system accounts are not Unix users. Printer Configuration", Collapse section "21.3. DHCP for IPv6 (DHCPv6)", Collapse section "16.5. (This is also what lastlogin is for on AIX.) Solaris has two tables: an equivalent one, and one that is not quite equivalent. username is a user's login name. Registering the System and Attaching Subscriptions, 7. Syntax: users [OPTION]. The Built-in Backup Method", Collapse section "34.2.1. "echo $USER" produces the name I logged in as whether run under sudo or not, while "whoami" returns "root" when run under sudo and my actual login name otherwise. Configuring the kdump Service", Collapse section "32.2. Viewing Memory Usage", Collapse section "24.2. Deeps, Hello All, Monitoring Performance with Net-SNMP", Expand section "24.6.2. Enabling and Disabling a Service, 13.1.1. /etc/sysconfig/kernel", Collapse section "D.1.10. Additional Resources", Expand section "21.3. Kudos! Establishing Connections", Collapse section "10.3. To get the new LUNs information. Running the At Service", Collapse section "27.2.2. Retrieving Performance Data over SNMP", Expand section "24.6.5. Configuring Static Routes in ifcfg files", Expand section "V. Infrastructure Services", Collapse section "V. Infrastructure Services", Expand section "12. rpm2cpio | cpio -idvh Configure the Firewall Using the Command Line, 22.14.2.1. The variable username is a user's login name. Enabling Smart Card Authentication, 13.1.4. Configuring a System to Authenticate Using OpenLDAP, 20.1.5.1. Configure RedHatEnterpriseLinux for sadump, 33.4. Checking for Driver and Hardware Support, 23.2.3.1. Even if it isn't intentionally tampered with, a common case where it's still incorrect is when the user is switched without starting a login shell (su's default). Configuring 802.1X Security", Collapse section "10.3.9.1. Establishing Connections", Expand section "10.3.9. For more information, see the Calculating probabilities from d6 dice pool (Degenesis rules for botches and triggers). Configure the Firewall for HTTP and HTTPS Using the Command Line", Collapse section "18.1.13. Also, the systemd-cgls command is provided to view the hierarchy of control groups and systemd-cgtop to monitor their resource consumption in real time. Analyzing the Data", Expand section "29.8. i need the user to be created like this Date/Time Properties Tool", Collapse section "2.1. Process Directories", Red Hat JBoss Enterprise Application Platform, Red Hat Advanced Cluster Security for Kubernetes, Red Hat Advanced Cluster Management for Kubernetes, 1.2. List samba shares and the users who can access each of them. Displaying Information About a Module, 31.6.1. The nature of simulating nature: A Q&A with IBM Quantum researcher Dr. Jamie We've added a "Necessary cookies only" option to the cookie consent popup. Additional Resources", Collapse section "D.3. if you tried the command before adding untrue comments, you would see that the. File System and Disk Information, 24.6.5.1. ./program & The nature of simulating nature: A Q&A with IBM Quantum researcher Dr. Jamie We've added a "Necessary cookies only" option to the cookie consent popup. In Linux for .rpm Can I change the output format of the "last" command to display the year? Accessing Graphical Applications Remotely, D.1. After the input is read, the shell must execute the command supplied by the user. The runacct tool, run daily, invokes the lastlogin command to populate this table. Not the answer you're looking for? Network Interfaces", Expand section "11.1. In the NetBSD, FreeBSD, and OpenBSD login accounting systems, there is an equivalent table (albeit with a different structure and name), and (in the NetBSD and FreeBSD systems) a lastlogin command that dates from the middle 1990s. Checking if the NTP Daemon is Installed, 22.14. The runacct tool, run daily, invokes the lastlogin command to populate this table. Files in the /etc/sysconfig/ Directory", Expand section "D.1.10. Use the /add option to add a new username on the system. Index. However, on Solaris, you may have to determine the user ID, by determining the UID of the user logged-in through the command below. Viewing CPU Usage", Expand section "24.4. How to handle a hobby that makes income in US. The Solaris table that is directly equivalent is /var/adm/lastlog, which is not mentioned in Oracle doco. Unless I'm mistaken this would be the way to go if portability is a concern as the. NOTE: you need Bash as the interpreter here. Configuring Protected EAP (PEAP) Settings, 10.3.9.3. /etc directory. Running the httpd Service", Collapse section "18.1.4. Additional Resources", Collapse section "19.6. Additional Resources", Collapse section "14.6. /etc/sysconfig/kernel", Expand section "D.3. Using opreport on a Single Executable, 29.5.3. UNIX password: Enter new UNIX password: Retype new UNIX password: passwd: password updated successfully. Selecting the Identity Store for Authentication", Expand section "13.1.3. Managing Users via Command-Line Tools", Expand section "3.5. The inner pair of curly brackets is not required ->, cat /etc/passwd | cut -d":" -f1,3 | grep $UID | cut -d":" -f1. $ ldapsearch -x -b <search_base> -H <ldap_host> -D <bind_dn> -W Viewing Memory Usage", Collapse section "24.3. It is owned by user root and group shadow, and has 640 permissions. -l username Displays the login status for the specified user. Configuring IPv6 Tokenized Interface Identifiers, 12.2.1. This command will extract data from the lastlog file (/var/log/lastlog) and display the last login recorded. echo "Executing My admin has set password policy to de-activate user account if there is not login for 90 days. Network Configuration Files", Collapse section "11.1. preferred over using the cat command to view similar information. . Introduction The netstat command is a CLI tool for net work stat istics. When creating users on Linux the user details are stored in the " /etc/passwd" file. Is it suspicious or odd to stand by the gate of a GA airport watching the planes? The last command, that other people are pointing to, is not particularly useful because it does not operate from either one. Domain Options: Using IP Addresses in Certificate Subject Names (LDAP Only), 13.2.21. Enabling and Disabling a Service, 12.2.1.2. /var/log/wtmp as FILE is common. Is there a proper earth ground point in this switch box? Managing the Time on Virtual Machines, 22.9. df -k Use the df -k command to display disk space information in Kbytes. Updating Packages with Software Update, 9.2.1. Enabling and Disabling SSL and TLS in mod_nss, 18.1.11. / 1. Securing Communication", Collapse section "19.5.1. Running an OpenLDAP Server", Collapse section "20.1.4. Using Add/Remove Software", Expand section "10.2. Using the chkconfig Utility", Collapse section "12.3. Configuring Centralized Crash Collection", Collapse section "28.5. Cron and Anacron", Expand section "27.1.2. /etc/sysconfig/system-config-users, D.2. Specific Kernel Module Capabilities", Collapse section "31.8. Display a user's login status by using the logins command. I have the following script: rpm -qpl Configuring Static Routes in ifcfg files, 11.5.1. Managing Groups via the User Manager Application", Collapse section "3.3. Antimalware protection extends from hypervisor to application. On Solaris, use command -p id (from a POSIX shell) or /usr/xpg4/bin/id. Working with Transaction History", Expand section "8.4. Integrating ReaR with Backup Software", Expand section "34.2.1. Administrative Rights in, What's New in Securing Systems and Devices in Oracle Solaris 11.2, Algorithms Configuration in the policy.conf Encrypting vsftpd Connections Using TLS, 21.2.2.6.2. Configuration Steps Required on a Client System, 29.2.3. Disabling Console Program Access for Non-root Users, 5.2. Configuring Postfix to Use Transport Layer Security, 19.3.1.3.1. You can also get group information of a user with id command. Internet Protocol version 6 (IPv6), 18.1.5.3. Using the dig Utility", Collapse section "17.2.4. I want to list all the VIP addresses assigned to Solaris server. Changing the Global Configuration, 20.1.3.2. Configuring the Time-to-Live for NTP Packets, 22.16.16. Managing Users via the User Manager Application, 3.3. Common Multi-Processing Module Directives, 18.1.8.1. Automating System Tasks", Collapse section "27. Let us know how it goes, Regards, RJ Guru 2569 points 3 September 2020 7:18 AM disk or part (i.e. user's login status. When root (sudo) permissions are required, which is usually 90%+ when using scripts, the methods in previous answers always give you root as the answer. Filesystem 1K-blocks Used Available Use% Mounted on How do I iterate over a range of numbers defined by variables in Bash? Additional Resources", Expand section "15.3. Working with Kernel Modules", Expand section "31.6. List Linux users with compgen A few tips about listing users in Linux List only the usernames Check if a username already exists in the system List all the connected users From what I'm seeing here all answers are wrong, especially if you entered the sudo mode, with all returning 'root' instead of the logged in user. The Policies Page", Collapse section "21.3.10.2. Programmer Analyst Chaffey College Salary: $8,650.00 Monthly Job Type: Classified Contract Job Number: 22-23/00072 Location: Rancho Cucamonga, CA Department: Information Technology Services Closing: 3/22/2023 11:59 PM Pacific Position Description Under direction, provides analysis of District programming needs, technical specifications, and . It only takes a minute to sign up. Configuring the YABOOT Boot Loader, 31.2. Using sadump on Fujitsu PRIMEQUEST systems", Expand section "34. You can achieve even a simple task like identifying the current user in many ways. Creating Domains: Kerberos Authentication, 13.2.22. Adding a Broadcast or Multicast Server Address, 22.16.6. I have written one script for following condition by referring some of online post in this forum. /domain. Manually Upgrading the Kernel", Collapse section "30. Configuring kdump on the Command Line, 32.3.5. Configuring the OS/400 Boot Loader, 30.6.4. Here is a good script to find all the CPU, cores, virtual CPU (threads) Adding the script from the link would improve the answer. In both the Linux and BSD worlds, this table is updated by the same programs that write the login log table and the currently active logins table, two other tables in the login database. A place where magic is studied and practiced? Packages and Package Groups", Collapse section "8.2. Configuring Local Authentication Settings, 13.1.4.7. Managing Kickstart and Configuration Files, 13.2. Managing Users and Groups", Collapse section "3. RedHat EnterpriseLinux 6 provides you with the, To display detailed information about a single user, run the, Expand section "I. To change dhart's username to dbell . Extending Net-SNMP", Collapse section "24.6.5. The bug resides in the ClamAV Unix socket permitting any user to submit the "shutdown" command which will disable ClamAV. It will always print the logged in user's name and then exit. - jww Jul 9, 2016 at 18:00 Add a comment 0 df Use the df command to show the amount of free disk space on each mounted disk. Configuring the named Service", Collapse section "17.2.1. I've been doing Linux and AIX administration for years, but I'm very new to HPUX. So far i have: top -d 1.0 -p $PID Can someone tell me the Solaris equivelant of aix command lsuser? Using Postfix with LDAP", Collapse section "19.3.1.3. Solaris is a Lending/Borrowing protocol that brings Flashloans to Solana blockchain (inspired by Aave and Compound) The project is a modification of the solana lending program. Practical and Common Examples of RPM Usage, C.2. Interface Configuration Files", Expand section "11.2.4. It produces real-time displays of where any Satellite is, and predicts passes for your locale. One step, multinode compliance reporting means you can . Why do many companies reject expired SSL certificates as bugs in bug bounties? Configuring Services: OpenSSH and Cached Keys, 13.2.10. Signing an SSH Certificate Using a PKCS#11 Token, 15.3.2.1. Working with Queues in Rsyslog", Collapse section "25.5. the permission flag would show the character "s", such as. ls -la I need to extract the value 91 from this and use it in my script in an if condition. Example Usage", Expand section "17.2.3. Specific ifcfg Options for Linux on System z, 11.2.3. tail /var/adm/messages. If you're using Solaris, your logs are located in /var/adm. We run an IMAP server at work. Establishing a Wireless Connection, 10.3.3. I know we use read to play with user inputs. Enabling the mod_nss Module", Expand section "18.1.13. Those 2 commands display 2 different informations. Viewing System Processes", Collapse section "24.1. Configuring Authentication from the Command Line", Collapse section "13.1.4. In the directory /var/adm/acct/sum you will find a file called loginlog. Using the Command-Line Interface", Collapse section "28.4. Is it possible to rotate a window 90 degrees if it has the same length and width? What is the Solaris equivalent of chage -d?