Sponsored Content
The Lounge War Stories Anger management at work without others finding out Post 302713335 by DGPickett on Wednesday 10th of October 2012 01:33:05 PM
Old 10-10-2012
Maybe just use Ubuntu and the software and updates windows! Smilie The hp-ux binary repository in the UK tells you with hyperlinks what is required, but you can click a lot to get the whole tree.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Script doesn't work, but commands inside work

Howdie everyone... I have a shell script RemoveFiles.sh Inside this file, it only has two commands as below: rm -f ../../reportToday/temp/* rm -f ../../report/* My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies

2. Shell Programming and Scripting

finding duplicate files by size and finding pattern matching and its count

Hi, I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern. Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies

3. UNIX and Linux Applications

Password management / centralized password management

Hello all, I need help for build server call as Password management / centralized password management server. My situation and example: I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies

4. IP Networking

NIC will not work, but it did work.

I have a client machine that was built and loaded with SCO UNIX 2.1.3, (yes it is old). The machine worked fine on the closed network that I tested on in my shop. I then had to change it to the network that it would be connected to. Below is the host file, router and subnet mask file that I usually... (0 Replies)
Discussion started by: NC user
0 Replies

5. IP Networking

IP Management

Hello all, I was wondering which way do you use to manage you IPs? For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all. But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies

6. Shell Programming and Scripting

My script work on Linux but not work in sunos.

My script work on Linux but not work in sun os. my script. logFiles="sentLog1.log sentLog2.log" intial_time="0 0" logLocation="/usr/local/tomcat/logs/" sleepTime=600 failMessage=":: $(tput bold)Log not update$(tput rmso) = " successMessage="OK" arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies

7. IP Networking

Discussion at work, would a router work pluging a cable in wan1 and lan1?

hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view situation a router, with linux of some sort, dhcp client requesting for ip in wan1 (as usual with wan ports) dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies

8. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
GEN_KEYMAP(1)						  Ubuntu General Commands Manual					     GEN_KEYMAP(1)

NAME
gen_keymap -- generate a keyboard map decision tree SYNOPSIS
gen_keymap list ... DESCRIPTION
gen_keymap generates a decision tree from a set of keyboard maps which can be used to help a user decide which keyboard map to use. The pro- gram using the decision tree typically asks the user to press some keys; at each step, it examines the returned keycode and uses it to prune the list of possible keyboard maps until there is only one left. OPTIONS
--version Show program's version number and exit. -?, --help Show help text. -v, --verbose Be more verbose. -mMINLEN, --minlen=MINLEN Too-short keymaps are skipped (default: 30 entries). -g, --graph Generate a hopefully-nice-looking .dot file. --maps Print the to-be-processed keymaps -i, --installer Input files are in d-i map form. -IDIRS, --inc=DIRS, --include=DIRS Add a directory to the search path. -oFILENAME, --output=FILENAME Set output file (default: stdout). -fFILTER, --filter=FILTER Include only the branches leading to these keymaps. -uUSEONLY, --useonly=USEONLY Start generating the tree based only on these keymaps. (The difference between --filter and --useonly is that the former generates the whole tree and then prunes it, while the latter only generates a reduced tree to begin with. This may have implications for perfor- mance on large trees.) -sSKIP, --skip=SKIP Keymaps to skip. -t, --test Test the generated maps. --interactive Ask user to choose among indistinguishable keymaps. AUTHORS
gen_keymap was written by Matthias Urlichs <smurf@debian.org>. This manual page was written by Colin Watson <cjwatson@ubuntu.com>. Ubuntu September 5, 2006 Ubuntu
All times are GMT -4. The time now is 09:26 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy