Provided by: john_1.6-39ubuntu1_i386 bug

NAME

       unshadow - combines passwd and shadow files

SYNOPSIS

       unshadow password-file shadow-file

DESCRIPTION

       This  manual page documents briefly the unshadow command, which is part
       of the john package.  This manual  page  was  written  for  the  Debian
       GNU/Linux  distribution  because  the  original program does not have a
       manual page.  john, better known as John the Ripper, is a tool to  find
       weak passwords of users in a server.

       The  unshadow tool combines the passwd and shadow files so John can use
       them. You might need this since if you only used your shadow file,  the
       GECOS information wouldn’t be used by the "single crack" mode, and also
       you wouldn’t be able to use the ’-shells’ option. On  a  normal  system
       you’ll need to run unshadow as root to be able to read the shadow file.

SEE ALSO

       john(8), mailer(8), unafs(8), unique(8).

       The programs are documented fully by John’s documentation, which should
       be  available  in  /usr/share/doc/john  or other location, depending on
       your system.

AUTHOR

       This manual page was written by Jordi Mallach  <jordi@debian.org>,  for
       the Debian GNU/Linux system (but may be used by others).
       John   the   Ripper   and   mailer   were  written  by  Solar  Designer
       <solar@openwall.com>. The complete list of contributors can be found in
       the CREDITS file in the documentation directory.