What's the root password when the server software is installed?

I read one item through Google that said when the server software is installed (the root account is enabled automatically), the password is the same as the one assigned to the administrator you define. That doesn't appear to be the case. I can't 'su' to the root account.
Why do I want to? I'm trying to find out why ssh hangs going to another box on my Lan and want to look at the services, configurations, and log files.

You could try the command line. There are several options, but 'dsenableroot' might be a good choice. Assuming your "admin" account is in good standing:<pre>/usr/sbin/dsenableroot -u adminusername</pre>You will first be prompted for the "user" password (meaning that of the "admin" user whose name was entered), then for the password you want to use for "root" (twice), though for security reasons none of the passwords will be displayed as you type - just hit the "return" key after each one.

Similar Messages

  • What are the correct steps for installing Oracle Entitlement Server SSM?

    Can somebody explain what are the correct steps to install OES SSM 10.1.4.3? I have installed OES admin 10.1.4.3 and applied the CP2 patch. it is allowing me to open Entitlement Administration, where I can define the policy.
    Is it sufficient to have this Entitlement Admin to call the policy from BPM? Do I need a SSM ?
    When I try to configure Java SSM using ConfigTool.bat -process myssm_config.properties I am getting the following error
    Is Admin in the same BEA-HOME as SSM: [default: Yes]:
    Give the location of the Admin: c:\bea\ales32-admin
    Enter the identity directory name which will be used: [default: CoESSM_dir]:
    Enter the root node which will be used to create resources: [default: //app/policy/CoESSM_app]:
    Checking if default ARME port is free: 8000
    Generating policy files based on templates ...
    Checking if SSM instance already present
    Checking to see if SSM ARME port is free.
    Checking JDBC parameters...
    Checking to see if asipassword was run...
    2010-03-15 18:06:59,295 [Main Thread] ERROR com.bea.security.SsmConfigTool.AlesConfig - You need to run asipassword first
    2010-03-15 18:06:59,295 [Main Thread] ERROR com.bea.security.SsmConfigTool.ConfigurationTool - Error making changes: You need to run asipassword first
    I have tried running the asipassword utility, but still it gives the same error. Please let me know what am I doing wrong?

    Yes I have explored this pdf...but it doesn't tell how to use the policy from the BPM. My question is if I want to use the policies from BPM, then do I need to install the SSM ?
    If yes, what are the correct steps of installation ?
    I am getting the errors while configuring the Java SSM.
    Is Admin in the same BEA-HOME as SSM: [default: Yes]:
    Give the location of the Admin: c:\bea\ales32-admin
    Enter the identity directory name which will be used: [default: CoESSM_dir]:
    Enter the root node which will be used to create resources: [default: //app/policy/CoESSM_app]:
    Checking if default ARME port is free: 8000
    Generating policy files based on templates ...
    Checking if SSM instance already present
    Checking to see if SSM ARME port is free.
    Checking JDBC parameters...
    Checking to see if asipassword was run...
    2010-03-15 18:06:59,295 [Main Thread] ERROR com.bea.security.SsmConfigTool.AlesConfig - You need to run asipassword first
    2010-03-15 18:06:59,295 [Main Thread] ERROR com.bea.security.SsmConfigTool.ConfigurationTool - Error making changes: You need to run asipassword first
    I have tried running the asipassword utility, but still it gives the same error. Please let me know what am I doing wrong?

  • What does The server responded: "403" to operation CalDAVRemovePropertyQueueableOperation mean?.

    What does
    "The server responded:
    “403”
    to operation CalDAVRemovePropertyQueueableOperation."
    mean?

    It means you are screwed as Apple Support is on vacation..... I have the same problem

  • Oracle 9i , what starts the server process

    I'm reading the documentation about the server process which communicates with the client process eg sqlplus. But I'm not sure about how the server process is started. Imagine a server where the instance is not running . I log in via sqlplus /nolog , connect as sysdba and execute the startup command. According to the documentation it is the server process which starts the instance , but what starts the server process. Perhaps it is the sqlplus process. And if i log in using sqlplus over the network , I communicate with the listner, in this case is it the listener which starts the server process. ?
    George

    Hi,
    Take a look:
    "... Some user processes cannot communicate with the dispatcher, so the network listener process cannot connect them to a dispatcher. In this case, or if the user process requests a dedicated server, the listener creates a dedicated server and establishes an appropriate connection."
    Oracle® Database Concepts 10g Release 2 (10.2)
    Process Architecture
    http://download-east.oracle.com/docs/cd/B19306_01/server.102/b14220/process.htm#i21918
    How Do Listeners Respond to Connection Requests
    The listener can spawn a new process and pass control of the client session to the process. In a dedicated server environment, every client connection is serviced by its own server-side process. Server-side processes are not shared among clients. Depending on the capabilities of the operating system, two types of dedicated server connections are possible: bequeath connections and redirect connections. Each results in a separate process that handles client processing, but the mechanics of the actual connection initiation process are different.
    Cheers

  • Is there any way I can know what are the list of patches installed on Indesign Server CS5

    Hi All,
    Is there any way I can know what are the list of patches installed on Indesign Server CS5?
    Please let me know if the there is any command to do so.
    Thanks,
    Manjunath

    Is this link any help?
    http://www.btvision.bt.com/on-demand/?cat=filmclub
    It seems to give the film club info.
    If you sort the list by "ending" date, shoul should be able to find recently added ones.
    There are some useful help pages here, for BT Broadband customers only, on my personal website.
    BT Broadband customers - help with broadband, WiFi, networking, e-mail and phones.

  • I am trying to sync calendar and contacts on the BB Z10, using iCloud. What is the server address?

    I am trying to sync calendar and contacts on the BB Z10, using icloud, what is the server address?

    How Do I Get Rid Of The “Other” Data Stored On My iPad Or iPhone?
    http://tinyurl.com/85w6xwn
    With an iOS device, the “Other” space in iTunes is used to store things like documents, settings, caches, and a few other important items. If you sync lots of documents to apps like GoodReader, DropCopy, or anything else that reads external files, your storage use can skyrocket. With iOS 5/6/7, you can see exactly which applications are taking up the most space. Just head to Settings > General > Usage, and tap the button labeled Show All Apps. The storage section will show you the app and how much storage space it is taking up. Tap on the app name to get a description of the additional storage space being used by the app’s documents and data. You can remove the storage-hogging application and all of its data directly from this screen, or manually remove the data by opening the app. Some applications, especially those designed by Apple, will allow you to remove stored data by swiping from left to right on the item to reveal a Delete button.
     Cheers, Tom

  • HT4864 what are the server settings for icloud mail on samsung galaxy tab 2 outgoing works but incoming dosent

    what are the server settings for icloud mail on samsung galaxy tab 2 outgoing works but incoming dosent

    Found out the is a bug in the mail app built into android using another app instead now

  • To video editors: What's the best software video encoder?

    I'm relatively new to the encoding world, outside of .m2v for DVD.  I have a Mac Pro Dual Quad-Core 2.4 Ghz Intel Xeon system with 14 GB of RAM and running OS X 10.7.2.  I have the latest version of Final Cut Studio, which includes Final Cut Pro 7 and Compressor.  I also have Adobe Media Encoder, but upon testing, I was (ironically) flabbergasted by the fact that Adobe's encoding software doesn't come with support for .avi output.  For that reason, it's difficult to trust it.  I love what Compressor has to offer, and its encoding quality is more than satisfactory for any and all Mac-based file types, but obviously, the format limitations outside of the Apple realm present a problem in terms of the variety I can offer a client.  I would like to have the flexibility of .flv, .wmv, .avi, etc.
    Again, I love the QuickTime options of Compressor.  I have read that Flip4Mac has add-ons for the formats which I listed above, but I've never used that software for this kind of workflow.  I also have some experience with Sorenson Squeeze, but that was mainly on an Avid platform, and there were various frame size/crop issues with encoding which forced me as a user to jump through MANY hoops (none of those hoops are an issue in Compressor, but, again, file types are limited) in order to achieve my encoding goals.  However, Sorenson does offer support for every imaginable file type in its $599 Pro edition of the software.  I'd rather not spend that much just for an encoder if unnecessary, but I honestly have no real frame of reference in terms of cost-to-"output variety" ratio.
    So, to the many who are much more educated and experienced than I am, I ask, in your opinion as professionals...what's the best software encoder?  Is it one of the three I have already mentioned, or is it another software with which I am not yet familiar?  I am open to any and all suggestions and opinions.  At this point, I am mostly dealing with web delivery, whether it be streaming or downloadable file types, and DVD/Blu-Ray encoding for disc burn.  However, as I'm sure you understand, you never know what kind of project will come your way, or what kind of file type and/or size a client will require on any given day.  I'm really just trying to get an education on encoding in general so I can stay somewhat ahead of the curve, and be able to deliver as many different file types as possible so I never have to tell a client, "No, I can't do that."
    Thoughts?

    Sorry that you are not getting help.
    I would have said that there are some excellent people I see that hang out in the forums for Final Cut etc that would.
    I look more at hardware aspect and had you asked I would have recommend against the 2.4GHz in favor of 6-core 3.33 or 2.93 or something. Giving up GHz for more cores or something never works out.
    Then I would have stayed with 10.6.8 (maybe keep Lion handy for testing only).
    Setup a good storage subsystem, 6 x 4GB (or 3 x 8GB when using single cpu).
    A good place to start is over on www.macperformanceguide.com for setup hardware and testing.
    http://barefeats.com/macs11_01.html
    Handbrake
    http://www.barefeats.com/wst10c3.html
    http://macperformanceguide.com/Optimizing-Handbrake.html
    http://macperformanceguide.com/Reviews-MacProWestmere-Handbrake.html
    Why you want more RAM
    http://macperformanceguide.com/Reviews-MacProWestmere-AfterEffects.html
    http://macperformanceguide.com/Reviews-MacProWestmere-Memory.html

  • What's the better order to install OEM + AS + DB

    Hi everbody.
    What's the better order to install on RHEL4 Update2:
    - Enterprise Manager Control Grid (10gR2)
    - Database (10gR2)
    - Application Server (10gR3)
    And about the $ORACLE_HOME?? How to? Each instalation have a separate $ORACLE_HOME??
    Tks!

    Rafael,
    Save the Grid Control as the last installation. The order of Database and Application Server doesn't matter, however I would personally install the database first.
    Please read all Installation Guides' before starting any installations, and follow all pre-requisites stated for RHEL4.
    The Installation Guide's states that all products must be installed in separate ORACLE_HOME. As a matter of fact, the Oracle Installer doesn't allow installing any of these products into an existing ORACLE_HOME.
    Regards,
    Martin

  • I'm wifilooking at purchase a ipad2 3G/and I was wondering can I transfer DVDs (from a TV series for instance) from my Macbook pro. If so what is the best software. I already have Popcorn and Titanium toast. Thanks

    I'm looking at purchase a ipad2 3G/wifi and I was wondering can I transfer DVDs (from a TV series for instance) from my Macbook pro. If so what is the best software. I already have Popcorn and Titanium toast. Thanks

    THANKS FOR YOUR REPLY, I DOWNLOADED HANDBRAKE BUT WOULDN'T LET ME USE IT BECAUSE I DIDN'T HAVE VLC WHICH I DID. WHEN I FINALLY GOT HANDBRAKE TO WORK I SELECTED THE DVD FOR SOURCE AND IT STARTED SCANNING. A HALF HOUR LATER IT SAID NOT RECOGNISE SOURCE. TAKE IT IS ENCRYPTED.
    <Edited by Host>

  • What's the correct order to install OEM Grid Control + DB + AS?

    Hi everbody! I'm getting start on OracleAS and Grid Control.
    What's the correct order to install:
    * Enterprise Manager 10g Grid Control
    * Database 10gR2
    * Application Server 10gR3
    (on RHEL4-Upd2)
    or the order is not important?
    I need have the environment for each oracle software ($ORACLE_HOME, $ORACLE_BASE)? Or install first one, and change the environment and install, change again and install, etc.. ? :)
    Tks!

    Hey Rafael! You only have to use the Grid Control CDS, AS, repository database and grid control software are installed automatically, so you dont have to worry about the order u should have to follow.
    Anyways if u have already installed a database u can use that one as a repository.
    about the enviorment variables i guess u´ll be prompted for just one only directory cause u only need to install the software only one time.
    hope u find this interesting!!
    Regards, Luis

  • What is the best way to install qmail?

    I'm about to rebuild my server and want qmail on it. What is the best way to install it?
    In the past I've used http://qmailrocks.com/ but I've also looked at  http://lifewithqmail.com/.
    The problem I found with qmailrocks was that because it doesn't come from packages I have to remember to keep it up-to-date and I rarely remember.
    There is the package in AUR, can anyone comment on the stability of it and how easy it is to get running after it has been installed?

    myimagination's Mac OS Lion FAQ.
    https://discussions.apple.com/message/15733040#15733040
    Topics covered in the FAQ.
    0. Cautions / Before Upgrading.
    1. Apple UpToDate Program.
    2. How many Macs?
    3. Re-downloading from App Store?
    4. Reinstalling Lion. (clean install)
    5. Making a Lion DVD.
    6. Java
    (will be updated)

  • What is the best way to install client sccm 2012for all computer in my company

    in my company(25000 users) we have alot of branch(100-150 small Branch (every branch 50-100 users)) & 20 branch (100-100 users) .
    now only 11000 client in sccm2012
    What is the best way to install client for all computer
    Note that sccm 2012(1 primary site and 4 site system server every server (4 roles (management point  , Distribution Point  , site system , component server  ) ))
    and in boundaries i create boundaries but not for all branch and enable (boundary group for site assignment ) for every group 
    What is the best way to install client for all computer 
    thank u 

    You basically have 3 options, if you disregard a manual install.
    1. Client Push. Configure an account with local admin rights on the clients, and enable Site-Wide pushing of client.
    2. GPO. Import the GPO templates and enable the client to be installed that way
    3. Startup script.
    Of the 3, I usually go with a combination of client push and GPO.
    Take a look at http://technet.microsoft.com/en-us/library/gg712298.aspx for the complete documentation.
    FB

  • HT1338 Is anti virus necessary for iMac? if so, what is the best software?

    Is anti virus necessary for iMac? if so, what is the best software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is the best software to use for screen capture on a PC for use with FCPX?

    What is the best software to use for screen capture on a PC (windows 7) for use with FCPX? I've tried Camtasia and camstudio however the avi files cannot be imported by FCPX and the mov files produced by these programs are shown as just black screens in FCPX.

    I use to face this issue every now and then (as a freelancer) when I use to cut on FCP7.
    if the material is DV and was captured using Sony VEGAS, Premiere or Edius, the footage generally worked fine. You'll find most people will tell you to convert it regardless, however I found no issues working with them.
    A problem you'll definitely face is HDV material. Most PC editing software write HDV in their own codec, which can't be read in FCP.
    The only thing I can think of is to try converting HDV meaterial to QuickTime using something like MPEG Streamclip, or something similar.
    Good luck

Maybe you are looking for

  • Doubt in alv top of page

    hi, I am trying to pass top of page to my alv report. DATA : TY_EVENTS TYPE SLIS_ALV_EVENT, IT_EVENTS TYPE SLIS_T_EVENT. CLEAR TY_EVENTS. TY_EVENTS-NAME = SLIS_EV_TOP_OF_PAGE. TY_EVENTS-FORM = 'TOP_OF_PAGE'. APPEND TY_EVENTS TO IT_EVENTS. CALL FUNCTI

  • PO Material Field got grey-Error

    Hi All, We have created  a PO by refering the PR with Accnt assignment category K, so the entry of matl code is not required, we entered the matl decription. After that we have creted a PO with Account assignment cat A, as it is a asset, .. In all th

  • PDF as default selection for Select printing cotrol (for Web)

    Hi Can someone point me to righ direction? What we are trying to do is, in Infoview, set PDF as default selection for "Select printing Control (for Web)", so that each user does not have to do this in preferences in infoview. Is it possible to do so?

  • Nokia 6303 c troubleshooting

    Hello. I got this Nokia 6303 classic phone, for like 2 years and kept it up-to-date all the time. 5 or 6 months ago my telephone began to restart out of the blue. But it does not look like a common restart. The display suddenly blacks out and only if

  • My iPad 3 makes all photos transferred from my PC look like they have a yellowish colour cast.

    All photos transferred from PC have washed out, yellowish look to them. Same photographs appear fine on PC monitor and strangely, look fine when viewed through Flickr on iPad, not through Photos. All other colours look great on device. Same photos lo