Best of Technical Support
I want to delete a user account. But I can't find any command to do so. Is there any utility to do so? —Harry Wong
Many of the Linux distributions ship with a deluser or userdel command that reverses the action of the adduser or useradd command. Search the man pages or simply try the commands to see if they exist on your system.
Failing that, deleting a user consists of two main steps:
1) Delete the user's entry in /etc/passwd
As root, and using your favorite editor, edit /etc/passwd (I always make a backup copy before messing with the password file because you can never be too careful). Search for the line that starts with the users login ID and delete the entire line.
2) Delete the user's home directory.
Again as root, use the rm command recursively to get rid of files by typing —Vince Waldon email@example.com
I have just added four additional drives to my Linux/Compaq Proliant 1000. I recompiled the kernel to include the md/linear option. Now I cannot find any instructions on how to make the MD work with all the drives. What I want to do is have all five drives connected such that when the first drive is full, the data will go to the second drive and so on. —Robert Binz
More information on using MD can be found in the MD FAQ at ftp://sweet-smoke.ufr-info-p7.ibp.fr/pub/linux/. You should find two files. The first, md-FAQ, can answer many of your questions. The second, md035.tar.gz (this is the current version of MD at the time of this writing), contains the utilities you will need to manage your MD system, as well as more documentation.
Be aware the MD package is still under development. Certain parts of the system (such as mirroring) are not yet considered stable. If you plan to use MD, I recommend you join the mailing list by sending mail to firstname.lastname@example.org with the message body “subscribe linux-raid”. —Chad Robinson, BRT Technical Services Corporation email@example.com
I need to create a captive account which restricts the user to only FTP access of the system. I also need to restrict the user to accessing only directories above a root directory I specify. Can you please let me know how to implement this? —Steve Stuczynski
First add a guest group entry in the /etc/ftpaccess file. Specify which group of users will be treated as guests by typing guestgroup ftponly. Then create the ftponly entry in /etc/group by typing ftponly::22:. Next, create a user member of this group, with no shell, in /etc/passwd:
user1:the_passwd:22:22:Limited FTP user:/home/ftp/user1:/bin/true
Don't forget to create the /home/ftp/user1 directory. Last, add /bin/true in /etc/shells. Now check your work to make sure it works! —Pierre Ficheaux, Lectra Systemes firstname.lastname@example.org
There are simple and complex ways to restrict user access to FTP only. There is a HOWTO that describes this in detail, as well as potential security problems you should be aware of.
This FAQ is unfortunately not an official part of the Linux HOWTO and mini-HOWTO compilation, but Slackware users can find it as part of the installation anyway, in /usr/doc/faq/howto/mini/Anon-FTP-FAQ. Although the document is geared primarily towards creating a secure anonymous FTP site, it actually covers an extensive range of the setup required for your desired effect. —Chad Robinson, BRT Technical Services Corporation email@example.com
After a successful installation of Red Hat's Colgate release of Linux, I have found I would like to change some of my configuration settings. Is there a way to get back into the setup utility that steps you through setup? Or is there an easier way of doing this? In particular, my NIC is not working right and I don't know how to configure it correctly. —Jeff L. LaPlante
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide