<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: System Administration in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561373#M226589</link>
    <description>A user who has the access to their own directories/files will have the ability to rm their stuff. All you can do is educate and/or provide them with ample warnings.&lt;BR /&gt;&lt;BR /&gt;For all other situations, you will want the education/knowledge of who has the ability to do the rm command. This is a big part of knowing who has the root access, or who has UID=0 (equal to root access). &lt;BR /&gt;&lt;BR /&gt;There is no sure way to prevent. You can provide additional warnings via aliasing and you can educate.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 09 Jun 2005 12:31:13 GMT</pubDate>
    <dc:creator>Rick Garland</dc:creator>
    <dc:date>2005-06-09T12:31:13Z</dc:date>
    <item>
      <title>System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561369#M226585</link>
      <description>Any recommendations to on how to increase protection from the rm -rf command, other than creating an alias for rm?&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 09 Jun 2005 12:03:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561369#M226585</guid>
      <dc:creator>Wallace C. Chappell</dc:creator>
      <dc:date>2005-06-09T12:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561370#M226586</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;1. Sounds to me like an education issue&lt;BR /&gt;2. Be careful who you give root access to ?&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Thu, 09 Jun 2005 12:08:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561370#M226586</guid>
      <dc:creator>steven Burgess_2</dc:creator>
      <dc:date>2005-06-09T12:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561371#M226587</link>
      <description>Yes, discipline and user training. UNIX is designed to do what it is told and not ask confirmation. It assumes that the user knows what he is doing. You can, of course, create an alias that asserts the -i flag. Some of the other UNIX flavors (especially on that is popular on PC's) reverse the logic and asks before doing the rm.</description>
      <pubDate>Thu, 09 Jun 2005 12:08:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561371#M226587</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2005-06-09T12:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561372#M226588</link>
      <description>Thanks for the input.</description>
      <pubDate>Thu, 09 Jun 2005 12:12:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561372#M226588</guid>
      <dc:creator>Wallace C. Chappell</dc:creator>
      <dc:date>2005-06-09T12:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561373#M226589</link>
      <description>A user who has the access to their own directories/files will have the ability to rm their stuff. All you can do is educate and/or provide them with ample warnings.&lt;BR /&gt;&lt;BR /&gt;For all other situations, you will want the education/knowledge of who has the ability to do the rm command. This is a big part of knowing who has the root access, or who has UID=0 (equal to root access). &lt;BR /&gt;&lt;BR /&gt;There is no sure way to prevent. You can provide additional warnings via aliasing and you can educate.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Jun 2005 12:31:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561373#M226589</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-06-09T12:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561374#M226590</link>
      <description>Its also helpful to have the PS1 variable set in the .profile so the current directory will always be displayed&lt;BR /&gt;&lt;BR /&gt;(PS1=`hostname`'$PWD # ' ; export PS1)&lt;BR /&gt;&lt;BR /&gt;and get in the habit of always specifying the entire path when using the rm command.&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Jun 2005 13:46:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561374#M226590</guid>
      <dc:creator>roger_122</dc:creator>
      <dc:date>2005-06-09T13:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: System Administration</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561375#M226591</link>
      <description>hi wallace&lt;BR /&gt;&lt;BR /&gt;There are safeguards that can be taken by the user to  prevent an&lt;BR /&gt;accidental removal of files by the rm command.&lt;BR /&gt;&lt;BR /&gt;     1. If running ksh (Korn Shell), you can set an alias in your&lt;BR /&gt;        .kshrc file to default rm to rm -i. This will cause rm&lt;BR /&gt;        to prompt you for verification before  removing your files&lt;BR /&gt;        whenever rm is executed.&lt;BR /&gt;        Enter the following file in the .kshrc file:&lt;BR /&gt;&lt;BR /&gt;        alias rm='rm -i'&lt;BR /&gt;&lt;BR /&gt;     2. Creating a file named "-i" in a directory will expand the&lt;BR /&gt;        rm * command to rm -i, thus prompting for verification.&lt;BR /&gt;        You must put this file in each subdirectory to safeguard it.&lt;BR /&gt;        Create the "-i" file as follows:&lt;BR /&gt;&lt;BR /&gt;        echo "" &amp;gt; -i&lt;BR /&gt;&lt;BR /&gt;regards&lt;BR /&gt;&lt;BR /&gt;Vinod K&lt;BR /&gt;</description>
      <pubDate>Sat, 18 Jun 2005 02:41:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-administration/m-p/3561375#M226591</guid>
      <dc:creator>vinod_25</dc:creator>
      <dc:date>2005-06-18T02:41:11Z</dc:date>
    </item>
  </channel>
</rss>

