About Us

RSInfoMinds, a web based IT Training and Consultancy firm. It is established with high dreams in training people in IT Infrastructure Field. We provide Online and Class Room training in various fields of IT Infrastructure Management.

Join Us: http://www.facebook.com/RSInfoMinds
Mail Us: rsinfominds@gmail.com
Twitter: @RSInfoMinds

We are specialized in the below courses:

Redhat Linux Admin Redhat Linux Cluster
Redhat Virutualization IBM AIX Admin
IBM AIX Virtualization IBM AIX Cluster
HP Unix Admin HP Unix Cluster
HP Unix Virtualization Shell Scripting
Veritas Volume Manager Veritas Cluster
Oracle Core DBA VMWare


We provide training in such a way, So that you get in depth knowledge on the Courses you look for.

And we ensure you are very confident from each and every Techincal aspect that the IT Industry needs and expects from you.

We also conduct Workshops on the latest technology and the real time faculties sharing their work experiences to make you the best.

Saturday 21 June 2014

Delete a Oracle DB using DBCA In Silent Mode

Make Sure You Stop The DB "ORCL" Using > shutdown command.


How To Manually Reboot The HMC

Below are the pictures that would show how to reboot the HMC Manually.




How To Find The Users With Empty Password

/etc/shadow is the file which we look for password information.

/etc/shadow content:
===============

scott:!!:16236:0:99999:7:::
peter:!!:16236:0:99999:7:::
kevin:!!:16236:0:99999:7:::

This is actual content for a default user/new user.

[root@node1 /]# passwd -d scott
Removing password for user scott.
passwd: Success
[root@node1 /]# passwd -d peter
Removing password for user peter.
passwd: Success
[root@node1 /]# passwd -d kevin
Removing password for user kevin.
passwd: Success

scott::16236:0:99999:7:::
peter::16236:0:99999:7:::
kevin::16236:0:99999:7:::

The above is the content after remving the password for the user using the command # passwd -d

[root@node1 /]# cat /etc/shadow | awk -F: '($2==""){print $1}'
scott
peter
kevin
[root@node1 /]#


Now the above script will give the list of users with EMPTY PASSWORD.


pam_tally2 - The login counter (tallying) module

I have set up PAM Authentication to lock a user accoount after 3 attempts of incorrect password.

PAM Module: pam_tally2.so

password-auth-ac:
=============

auth        required      pam_tally2.so deny=3 file=/var/log/tallylog

account     required      pam_tally2.so

[root@node1 /]# pam_tally2 --user test
Login           Failures Latest failure     From
test                0
[root@node1 /]# 

login as: test
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Access denied
test@192.168.183.148's password:
Account locked due to 4 failed logins
Account locked due to 5 failed logins
Account locked due to 6 failed logins
Account locked due to 7 failed logins
Last login: Sun Jun 15 00:14:30 2014 from 192.168.183.1
[test@node1 ~]$


[root@node1 /]# pam_tally2 --user=test
Login           Failures Latest failure     From
test                6    06/15/14 00:23:20  192.168.183.1
[root@node1 /]# pam_tally2 --user=test --reset
Login           Failures Latest failure     From
test                6    06/15/14 00:23:20  192.168.183.1
[root@node1 /]# pam_tally2 --user=test
Login           Failures Latest failure     From
test                0
[root@node1 /]#

login as: test
test@192.168.183.148's password:
Last login: Sun Jun 15 00:20:07 2014 from 192.168.183.1
[test@node1 ~]$ whoami
test
[test@node1 ~]$