Modify [url removed, login to view] (download from [url removed, login to view]) to use native Linux security. Use any open source libraries and creative hacks as needed. More details: Basically just let the script assume the user-id of the logged in user (after checking their password in /etc/passwd), and let the filesystem permissions handle the access granted/denied, instead of checking it in code.
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless AGREED TO by the buyer).
Linux. Any language / any solution accepted.