Exercises
6.1 | If the system uses a shadow file and we need to obtain the encrypted password, how do we do it? | 6.2 | If you have superuser access and your system uses shadow passwords, implement the previous exercise. | 6.5 | Write a program to obtain the current time and print it using strftime, so that it looks like the default output from date(1). Set the TZ environment variable to different values and see what happens. |
|