Page 225 - DCAP602_NETWORK_OPERATING_SYSTEMS_I
P. 225

Unit 11: User Accounts




             cash vending machines                                                              notes
             Another powerful feature is e-transfer of money using the prepaid coupons by any land
             line or mobile phone, from anywhere to any client account.
             Cash vending machines, identical to ATMs but featuring an STB, and provided by the
             system provider at franchisee points will deliver real cash to MTM users.

             The system technology is identical to the pre-paid system and uses the mobile network and
             switching systems for access, but its function is transparent to the latter. The whole idea is
             to make the micro-payment banking facility available, accessible and affordable for people
             at the lower end of the economic strata across the country.
             excess Liquidity

             The proposed system will be an exclusive technology-oriented mobile banking system that
             is transparent to mobile service providers, banks or other financial architecture owned by
             the Government.

             Since MTM deals amount to being virtual e-transactions, most of the real money remains
             within the MTM system.
             The huge excess liquidity available with MTM owner can be profitably deployed in various
             banking products, subject to regulatory norms.
          Source: http://www.thehindubusinessline.in/2010/11/02/stories/2010110252550700.htm

          11.4 summary

          Under Linux (and other Unixish oses) you use command called su. It is used is used to become
          another user during a login session or to login as super user. One of the most important activities
          in administering a Linux box is the addition of users. Here you’ll find some simple examples
          to provide a foundation for future chapters. It is not intended to be comprehensive, but is a
          good memory refresher. The sudo utility allows users defined in the /etc/sudoers configuration
          file to have temporary access to run commands they would not normally be able to due to file
          permission restrictions. Sometimes you’ll need to assign random groupings of users from various
          departments very similar sets of privileges.

          11.5 keywords


          Normal User: A “normal user” will be assigned some of these capabilities based on what group
          they are in, but is generally prevented from running any commands that may affect the system
          outside of their home directory.
          Super User: The super user with unrestricted access to all system resources and files in Linux is
          the user named root.

          Setuid and Setgid: setuid and setgid are Linux access rights flags that allow users to run an
          executable with the permissions of the executable’s owner or group.

          11.6 self assessment

          Fill in the blanks:

          1.   One of the most important activities in ..................... a Linux box is the addition of users.
          2.   When each new user first logs in, they are prompted for their new ..................... password.
          3.   The ..................... command is used to remove the user’s record from the /etc/passwd and
               /etc/shadow used in the login process.



                                           LoveLy professionaL university                                   219
   220   221   222   223   224   225   226   227   228   229   230