|
DataMuseum.dkPresents historical artifacts from the history of: Regnecentalen RC-900 |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about Regnecentalen RC-900 Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T u
Length: 2899 (0xb53) Types: TextFile Names: »usr/admin/setup «
└─⟦3d8f416b2⟧ Bits:30004042/core2.imd SW95705I 386/ix Multi-user Release 1.2 └─⟦this⟧ »usr/admin/setup «
#ident "@(#)setup 1.6 - 88/05/31" #help# #help# This procedure serves to set up the machine the very first time #help# it is used. It allows the user to define the first logins, #help# set the passwords on the other user-definable administration logins, #help# set system passwords, set the node name, and set the date, #help# time and timezone. #! chmod +x ${file} MENUTOP=`pwd` export MENUTOP # "Hide" the first time check routine. if [ -f /etc/rc2.d/S00firstcheck ] then mv /etc/rc2.d/S00firstcheck /etc/rc2.d/.00firstcheck fi # /etc/rc.d was an early version of /etc/rc2.d and this provides # compatibility. if [ -f /etc/rc.d/0_firstcheck ] then mv /etc/rc.d/0_firstcheck /etc/rc.d/.0_firstcheck fi echo ' Setup Procedure Setup establishes this machine as yours and can make sure that no one else uses it without your permission. We assume that you have read about "initial setup" in the GETTING STARTED chapter of the Owner/Operator Manual.' eval `find . -print | sed -n ' /\/adduser$/s/^/adduser=/p /\/admpasswd$/s/^/admpasswd=/p /\/datetime$/s/^/datetime=/p /\/nodename$/s/^/nodename=/p /\/syspasswd$/s/^/syspasswd=/p'` echo ' The first step is to set the timezone, date, and time of the system clock.' if [ -z "${datetime}" ] then admerr $0 Could not find datetime under `pwd`. else sh ${datetime} fi echo ' The next step is to set up logins. The first one you make should be for yourself. ' if [ -z "${adduser}" ] then admerr $0 Could not find adduser under `pwd`. else sh ${adduser} fi echo ' NOTE: Your password is very important. It is the way that the computer verifies that someone who attempts to login as you is indeed you. If you give it away to someone, they can do anything you can do and the machine does not know the difference. The next step is to establish passwords for the administrative logins and commands. ' if [ -z "${admpasswd}" ] then admerr $0 Could not find admpasswd under `pwd`. else sh ${admpasswd} fi echo ' The next step is to establish passwords for the system logins that do not already have them. Once set, these passwords can only be changed by the login or "root". ' if [ -z "${syspasswd}" ] then admerr $0 Could not find syspasswd under `pwd`. else sh ${syspasswd} fi echo ' The next step is to set the node name of this machine. This is the name by which other machines know this one. ' if [ -z "${nodename}" ] then admerr $0 Could not find nodename under `pwd`. else sh ${nodename} fi echo ' This completes your initial set up of the machine. You may now log into your login. ' # "Hide" the 'Welcome ... setup up your machine' message. if [ -f /etc/rc2.d/startlist/setup ] then mv /etc/rc2.d/startlist/setup /etc/rc2.d/startlist/.setup fi # /etc/rc.d was an early version of /etc/rc2.d and this provides # compatibility. if [ -f /etc/rc.d/setup ] then mv /etc/rc.d/setup /etc/rc.d/.setup fi