Solved

Hope I am in correct topic area....password change for Yosemite Backup on Red Hat Linux

Posted on 2006-11-21
2
490 Views
Last Modified: 2013-12-04
I dont know what the version of Red Hat Linux is.
I changed the password for the Yosemite Backup application itself.  I logged out of the Yosemite Backup application, and then logged back in with my new password with success.  Note that this new password is exactly the same as the old password.  Yosemite Backup seemed to allow me to change the old password to the same exact value as the new password....

I then changed the Yosemite Backup settings so the password would never expire.  That is all I did.  I then logged out of the Yosemite Backup application.

I then had to log back in to the Yosemite Backup application, and it did not accept the new password!!   It let me in before, so why not now?  Do you think there is something within the application that is not allowing me to use the same value for the new password as the old password?  If so, why did it let me change it like that without any warnings, and why did it let me log back in the first time after changing it?

Thanks!
0
Comment
Question by:cliffordgormley
2 Comments
 
LVL 48

Accepted Solution

by:
Tintin earned 500 total points
ID: 17993732
You can find your Redhat release by doing

cat /etc/redhat-release

If you tried to set the new password to the same value as the old password, you would have got the message:

Password unchanged

or something similar if you did it was the backup user itself.

If you did it as root, then there's no way of telling.

0
 

Author Comment

by:cliffordgormley
ID: 18009537
Tintin or anybody else,
If I resinstall the Yosemite backup software, can I start with a new password?

If I reinstall with the new software, can I still use the tapes that the 'old' installation used?

Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now