Polecenie chage
Opcje wykonania chage
w konsoli
This flag is used without any others and causes chage to display the current password expiration attributes for the user.
Minimum number of days between password changes. Default is zero, meaning that the user may change the password at any time.
Maximum number of days between password changes.
Date of last password change. This may be expressed as a date in YYYY-MM-DD format, or as the number of days between January 1, 1970 and the last password change.
If a password expires and the user does not log in for this number of days, the account will be locked and the user must contact a system administrator before logging in. Set to 0 to disable the feature.
Set the date when the account will be locked. This is not a date for password expiration, but for account expiration. It may be expressed as a YYYY-MM-DD date or as a number of days since January 1, 1970.
The number of days before password expiration that a user will be warned to change passwords.
Przykłady chage działanie w Słownik polecenie C
- Przykład CHAGE użycie :
- Jak użyć System administration command. Start the print scheduler for the Common UNIX Printing System co to jest.
- Przykład CHAGE użycie :
- Jak użyć Copy file archives from or to tape or disk, or to another location on the local machine. Each of the three flags -i , -o , or -p accepts different options definicja.
- Przykład CHAGE użycie :
- Jak użyć function and macro names defined in a programming source file . More than one file may be specified. ctags understands many programming languages, including C, C++, FORTRAN, Java, Perl, Python, flex co znaczy.
- Przykład CHAGE użycie :
- Jak użyć redundancy check (CRC) checksum for all files ; this is used to ensure that a file was not corrupted during transfer. Read from standard input if the character - is given or no files are given słownik.
- Przykład CHAGE użycie :
- Jak użyć administration command. The PCMCIA card daemon. cardmgr monitors PCMCIA sockets for devices that have been added or removed. When a card is detected, it attempts to get the card's ID and znaczenie.