<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: personal root accounts in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714108#M757396</link>
    <description>I do this all the time on my systems.  I also believe that an account password shared by users will end up sticky-padded all over the place.  Here are my details:&lt;BR /&gt;&lt;BR /&gt;1.  My systems are behind a firewall.&lt;BR /&gt;2.  My systems are trusted.  Password rules are enabled and enforced.&lt;BR /&gt;3.  I have complete trust in the the persons that get this access and their skills.  Also in their ability to have a strong password, rather than a trivial one.&lt;BR /&gt;4.  I have my OS/mirror dd over to disks weekly, so if all of roots files do get deleted, I can swap disks and boot right back up.&lt;BR /&gt;5.  All of the UID 0 users have the same home, /root.&lt;BR /&gt;6.  Each one generates their own history file, such as /root/.history.jdroot&lt;BR /&gt;7.  A user that has their personal root account can have their own password, and will not write them down.&lt;BR /&gt;8.  If one of the users do leave the company, their personal root account is simply deleted, without the need to notify other root users of a new password, which can also be hazardous security-wise.  When the account is deleted, I tell it not to delete the files.&lt;BR /&gt;9.  The password to the actual root account is known only to me and one other person.&lt;BR /&gt;10.  I use the /etc/securetty file.&lt;BR /&gt;11.  I use extensive IP filtering in the /var/adm/inetd.sec file.&lt;BR /&gt;12.  I create the account in SAM, assign UID 0, and ignore the warning.&lt;BR /&gt;13.  There is no necessity to share an account.  If there are multiple users logged in to one root account, you can tell who su-ed when, but not who actually typed the command that killed you.  Sharing the same account is also a big security no-no, esp. root.  I'm not the only SA responsible for these servers, so multiple root access is a necessity.  I think this offers the most comprehensive protection for the threats I'm likely to run into.&lt;BR /&gt;&lt;BR /&gt;As you can see, there are many trade-offs regarding security.  You have to prepare for the most likely threat.  Almost every security class I've taken points out the biggest threat is internal users, whether it's accidental or intentional/vindictive.  I have to agree.  I consider our systems to be pretty safe from external threats, esp. with IP filtering.  It's the internal threats that happen frequently.&lt;BR /&gt;&lt;BR /&gt;Good Luck!</description>
    <pubDate>Wed, 01 May 2002 19:07:27 GMT</pubDate>
    <dc:creator>Jimmy Rogers</dc:creator>
    <dc:date>2002-05-01T19:07:27Z</dc:date>
    <item>
      <title>personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714080#M757366</link>
      <description>Ive seen some systems where each admin has his own user account, and then access to an own root-account via su. This root-account is only possible to use via su, and only from the specific user account. (i belive that this was on a tru64 or digital unix system).&lt;BR /&gt;&lt;BR /&gt;Does anyone know if this is possible to do in hp-ux (10.20)? and if its possible, how?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2002 12:39:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714080#M757366</guid>
      <dc:creator>jim bidebo</dc:creator>
      <dc:date>2002-04-30T12:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714081#M757368</link>
      <description>Jim,&lt;BR /&gt;&lt;BR /&gt;I don't use it, but there is an application that will perform this task for HPUX.  It is called psuedo...su-do....psu-do????  I cant remember the name.  Do a search, I bet you will find it.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;...jcd...</description>
      <pubDate>Tue, 30 Apr 2002 12:47:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714081#M757368</guid>
      <dc:creator>Joseph C. Denman</dc:creator>
      <dc:date>2002-04-30T12:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714082#M757370</link>
      <description>You can setup your system quickly in such a way that "root" can ONLY login from the system console. All you have to do is create a file called /etc/securetty (root:bin with 600 permission) and in that file put the string ..&lt;BR /&gt;&lt;BR /&gt;console&lt;BR /&gt;&lt;BR /&gt;That way the only way normal users can't login directly as root to the system unless they are physically login in from the console, or remote console.</description>
      <pubDate>Tue, 30 Apr 2002 12:49:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714082#M757370</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2002-04-30T12:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714083#M757371</link>
      <description>Our SA's have to "su" up to root and enter a description on what and why they are doing such. It's a perl script that logs the stuff.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 30 Apr 2002 12:50:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714083#M757371</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-04-30T12:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714084#M757372</link>
      <description>Giving a user uid 0 makes them root. It works, but I wouldn't recommend it. You could put a user in all the groups that root is in. Again not good. &lt;BR /&gt;The reason for using su / su - for root access is to have an audit trail. If everyone logs in as root you won't be able to see who that user really is. &lt;BR /&gt;Also giving everyone root access even with their own account is a bit too much for me. I like to know who's using root and only if they really need it.&lt;BR /&gt;&lt;BR /&gt;Also if you create /etc/securetty and put the entry console in it you will only be able to login directly as root from the console. This will force all users to login as themsleves and then su to root.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Dave.</description>
      <pubDate>Tue, 30 Apr 2002 12:51:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714084#M757372</guid>
      <dc:creator>David Burgess</dc:creator>
      <dc:date>2002-04-30T12:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714085#M757373</link>
      <description>Hi,&lt;BR /&gt;it is through SUDO.&lt;BR /&gt;You can install SUDO , its freeware and you can give certain administrative commands to general user if you want to give access to them.&lt;BR /&gt;&lt;BR /&gt;Its a good tool though, I never used it. &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.courtesan.com/sudo/www.html" target="_blank"&gt;http://www.courtesan.com/sudo/www.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;visit the site for more information.&lt;BR /&gt;&lt;BR /&gt;-pap</description>
      <pubDate>Tue, 30 Apr 2002 12:53:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714085#M757373</guid>
      <dc:creator>pap</dc:creator>
      <dc:date>2002-04-30T12:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714086#M757374</link>
      <description>Forgot to say. If you want users to do root stuff and not be root you can set a restricted SAM for them.&lt;BR /&gt;&lt;BR /&gt;See man sam and the -r option.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Dave.</description>
      <pubDate>Tue, 30 Apr 2002 12:53:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714086#M757374</guid>
      <dc:creator>David Burgess</dc:creator>
      <dc:date>2002-04-30T12:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714087#M757375</link>
      <description>Hi Jim&lt;BR /&gt;&lt;BR /&gt;Here is a simple way to do it , put the following in /etc/profile , the system will not allow anyone to enter as root , they have to su to root and thus you can know who logs in by checking the su log :&lt;BR /&gt;&lt;BR /&gt;loginid=`who am i | awk '{print $1}'`&lt;BR /&gt;&lt;BR /&gt;echo $loginid&lt;BR /&gt;if [ $loginid = root ]&lt;BR /&gt;then&lt;BR /&gt;exit&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Manoj Srivastava</description>
      <pubDate>Tue, 30 Apr 2002 12:54:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714087#M757375</guid>
      <dc:creator>MANOJ SRIVASTAVA</dc:creator>
      <dc:date>2002-04-30T12:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714088#M757376</link>
      <description>do you mean sudo? but it does only allow a user to perform an action as root.&lt;BR /&gt;&lt;BR /&gt;like:&lt;BR /&gt;$sudo vi /etc/passwd &lt;BR /&gt;will allow the user to edit /etc/passwd as root (if the user is specified in the sudoers file and suplie the right pass). &lt;BR /&gt;&lt;BR /&gt;what i want is to have personal root accounts. &lt;BR /&gt;so i dont have to backtrack the root user to se which ip it was logged in from when he performed a task, and then trace the ip to see which mashine it is... and so forth untill i reach the person who did something.</description>
      <pubDate>Tue, 30 Apr 2002 12:55:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714088#M757376</guid>
      <dc:creator>jim bidebo</dc:creator>
      <dc:date>2002-04-30T12:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714089#M757377</link>
      <description>Jim,&lt;BR /&gt;&lt;BR /&gt;I don't think there is a way to create personal root accounts.  I believe sudo has the option of logging the task.  At least then you could track down who is doing what.  I would not give users a uid of "0"...bad security practice.  You can't track anything.&lt;BR /&gt;&lt;BR /&gt;Good Luck&lt;BR /&gt;&lt;BR /&gt;...jcd...&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2002 13:06:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714089#M757377</guid>
      <dc:creator>Joseph C. Denman</dc:creator>
      <dc:date>2002-04-30T13:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714090#M757378</link>
      <description>I've seen before how personalized root account is setup (after /etc/securetty is place).. though not a good idea .. eg: of a password entry ..&lt;BR /&gt;&lt;BR /&gt;jimsu:XXXX:0:3::/root/users/jimsu:/bin/ksh&lt;BR /&gt;&lt;BR /&gt;That way user "jim" only knows his "root" account password if you will and everything he does is "localized" to his .sh_history file.&lt;BR /&gt;&lt;BR /&gt;Do you really want to do this ?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2002 13:11:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714090#M757378</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2002-04-30T13:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714091#M757379</link>
      <description>well as always im a litle "wuzzy". Ill try to exlain it a litle more detailed. &lt;BR /&gt;&lt;BR /&gt;lets say that we have a user that should have root priviledges. the users name is john doe and his ordinary user account is jodo. the jodo account does only have normal user priviledges, not member of any system groups or so. so to get root priviledges to him i would like to create a new account called jodoroot. the jodoroot account should only be possible to use by john doe when hes logged in as jodo and use 'su jodoroot'. so it shouldnt be possible to login as jodoroot right away. nor should it be possible for an other user to su to jodoroot. and the systems root account shouldnt be used at all for normaly actions, only when the system requires root to login (like in singleusermode).&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2002 13:13:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714091#M757379</guid>
      <dc:creator>jim bidebo</dc:creator>
      <dc:date>2002-04-30T13:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714092#M757380</link>
      <description>Hi Jim,&lt;BR /&gt;&lt;BR /&gt;We use the Access Control portion of CA's E-Trust product.  The part that is relevant to your question is a command called "sesu".  Our SysAdmins log in with their mere mortal (non UID 0) account then sesu to root.  When doing this, they are prompted for their own password -- not root's password.&lt;BR /&gt;&lt;BR /&gt;After sesu-ing to root, the SysAdmins operate as root in every respect.  However, they're leaving thier own fingerprints in the E-Trust audit logs for everything they do.  The SysAdmins work unimpeded as root, and audit/security is frothy with delight over being able to see what is being done by each person.&lt;BR /&gt;&lt;BR /&gt;We do limit native root logins to /dev/console only via /etc/securetty.  Keep in mind, however, that we can ssh to a server with a mux that's connected to all the console ports -- very convenient.  If a native root login takes place on the console port, the SysAdmin is prompted for name and reason for root access.  The information is logged to a separate (secure) host.&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Jim</description>
      <pubDate>Tue, 30 Apr 2002 13:18:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714092#M757380</guid>
      <dc:creator>Jim Turner</dc:creator>
      <dc:date>2002-04-30T13:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714093#M757381</link>
      <description>if i restrict root to /dev/console&lt;BR /&gt;&lt;BR /&gt;creates a nonprivileded user account called jibi&lt;BR /&gt;and a root account called jibiroot and add :&lt;BR /&gt;&lt;BR /&gt;case $_ in &lt;BR /&gt;jibi)&lt;BR /&gt; &lt;NORMAL .profile=""&gt;&lt;BR /&gt;;;&lt;BR /&gt;*)&lt;BR /&gt;echo "Your not jibi! bye!"&lt;BR /&gt;exit&lt;BR /&gt;;;&lt;BR /&gt;esac&lt;BR /&gt;&lt;BR /&gt;to .profile in jibiroot's $HOME&lt;BR /&gt;&lt;BR /&gt;does anyone see any security issues in this procedure? does anyone have any better sugestions?&lt;/NORMAL&gt;</description>
      <pubDate>Tue, 30 Apr 2002 13:40:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714093#M757381</guid>
      <dc:creator>jim bidebo</dc:creator>
      <dc:date>2002-04-30T13:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714094#M757382</link>
      <description>Hi Jim,&lt;BR /&gt;&lt;BR /&gt;/etc/securetty will dis-allow any superuser (uid 0) account from logging in from any terminal other than those it allows.&lt;BR /&gt;&lt;BR /&gt;You can only su to an account if you know the password or if you are already a superuser.&lt;BR /&gt;&lt;BR /&gt;Any account with uid 0 is a superuser.  You can specify multiple superuser accounts in /etc/passwd.&lt;BR /&gt;&lt;BR /&gt;So far, so good.&lt;BR /&gt;&lt;BR /&gt;I believe most will recommend against personal superuser accounts.  If you have multiple superuser accounts, you have multiplied your security risks.  Now you have multiple passwords that could be compromised, multiple .rhosts files, perhaps multiple superuser passwords to change if someone leaves, etc.  If you just want to see who did what then you have /var/adm/sulog and /var/adm/syslog/syslog.log to rely on.  Hopefully you don't have many users logging in as a superuser at the same time.  If so, that's a different problem.&lt;BR /&gt;&lt;BR /&gt;Of course, any superuser can cover his tracks if he desires.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
      <pubDate>Tue, 30 Apr 2002 13:45:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714094#M757382</guid>
      <dc:creator>Darrell Allen</dc:creator>
      <dc:date>2002-04-30T13:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714095#M757383</link>
      <description>You can do this in their SPECIAL root account .profile, like joboroot:&lt;BR /&gt;&lt;BR /&gt;sudo exec /usr/bin/ksh&lt;BR /&gt;&lt;BR /&gt;gives them a root ksh and when they exit they get logged off.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 30 Apr 2002 13:49:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714095#M757383</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-04-30T13:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714096#M757384</link>
      <description>hmm.. thought my idea was pretty secured. &lt;BR /&gt;&lt;BR /&gt;in a normal case senario:&lt;BR /&gt;cracker gets his hands on a user account.&lt;BR /&gt;cracker cracks root&lt;BR /&gt;&lt;BR /&gt;in my vision senario: =)&lt;BR /&gt;cracker gets a user account. tries to crack root, but root isnt possible to login from anything except /dev/console, not even su to root should work. (sure he can probably get root by doing a bufferoverflow or something like that). otherwise he have to gain access to an account that has a personal root account. and thats 2 different passwords to crack. &lt;BR /&gt;&lt;BR /&gt;well, its not uncommon that a user types down their pass on a paper, and trows it away without maculate it first (and makes it possible for a cracker to gain access by dumpster diving or similiar). hopefully persons with superuser priviledges doesnt do this. especially when they chose their own superuser password. &lt;BR /&gt;&lt;BR /&gt;so by creating several uid 0 accounts it would actually increase security?&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2002 14:00:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714096#M757384</guid>
      <dc:creator>jim bidebo</dc:creator>
      <dc:date>2002-04-30T14:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714097#M757385</link>
      <description>jim,&lt;BR /&gt;&lt;BR /&gt;Great topic:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x96b70bce6f33d6118fff0090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x96b70bce6f33d6118fff0090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x316efd3f91d3d5118ff40090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x316efd3f91d3d5118ff40090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Great help in finding them:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x1e6f84534efbd5118ff40090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x1e6f84534efbd5118ff40090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 30 Apr 2002 14:03:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714097#M757385</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-04-30T14:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714098#M757386</link>
      <description>Jim,&lt;BR /&gt;&lt;BR /&gt;By no means would I ever add another "root" user to a system by creating 0 uid accounts. That is the LEAST secure method, hell it creates more opportunities to "crack" a root account's password.&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 30 Apr 2002 14:13:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714098#M757386</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-04-30T14:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: personal root accounts</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714099#M757387</link>
      <description>harry:&lt;BR /&gt;&lt;BR /&gt;i have given points to the answers that has been worth any points. and the only post that has been deserving any points is jim turners post. all the other things i did already know, or didnt filled any function in what i want to achive.</description>
      <pubDate>Tue, 30 Apr 2002 14:13:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/personal-root-accounts/m-p/2714099#M757387</guid>
      <dc:creator>jim bidebo</dc:creator>
      <dc:date>2002-04-30T14:13:57Z</dc:date>
    </item>
  </channel>
</rss>

