Sponsored Content
The Lounge War Stories Anger management at work without others finding out Post 302713413 by DGPickett on Wednesday 10th of October 2012 03:50:47 PM
Old 10-10-2012
Well, it sounds like the shop is very peer and loses some efficiency by not having roles. I was the build guy for my AT&T shop, and I think everyone else was glad to not have to bother.

Similarly, it is wise to have official trees of the same versions of common open software, so one does not get ahead of behind what is viable and sesirable, and apps do not get left dead when their libs upgrade!

It is sad to be in the land of no sense of best practices. Getting paid by the hour to do stupid seems like returning bad value. You know what rolls down hill, like micro-management and un-management?
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Script doesn't work, but commands inside work

Howdie everyone... I have a shell script RemoveFiles.sh Inside this file, it only has two commands as below: rm -f ../../reportToday/temp/* rm -f ../../report/* My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies

2. Shell Programming and Scripting

finding duplicate files by size and finding pattern matching and its count

Hi, I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern. Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies

3. UNIX and Linux Applications

Password management / centralized password management

Hello all, I need help for build server call as Password management / centralized password management server. My situation and example: I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies

4. IP Networking

NIC will not work, but it did work.

I have a client machine that was built and loaded with SCO UNIX 2.1.3, (yes it is old). The machine worked fine on the closed network that I tested on in my shop. I then had to change it to the network that it would be connected to. Below is the host file, router and subnet mask file that I usually... (0 Replies)
Discussion started by: NC user
0 Replies

5. IP Networking

IP Management

Hello all, I was wondering which way do you use to manage you IPs? For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all. But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies

6. Shell Programming and Scripting

My script work on Linux but not work in sunos.

My script work on Linux but not work in sun os. my script. logFiles="sentLog1.log sentLog2.log" intial_time="0 0" logLocation="/usr/local/tomcat/logs/" sleepTime=600 failMessage=":: $(tput bold)Log not update$(tput rmso) = " successMessage="OK" arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies

7. IP Networking

Discussion at work, would a router work pluging a cable in wan1 and lan1?

hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view situation a router, with linux of some sort, dhcp client requesting for ip in wan1 (as usual with wan ports) dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies

8. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
RPLAY.HOSTS(5)							File Formats Manual						    RPLAY.HOSTS(5)

NAME
rplay.hosts - rplay host authentication database SYNOPSIS
/usr/local/etc/rplay.hosts DESCRIPTION
The rplay.hosts file contains a list of hosts and access permissions which rplayd uses to validate incoming connections. Each line is of the form: hostname[:permission] where hostname is the name of a remote host or a host's IP address. Wildcards can be used within IP addresses to match multiple hosts. The wildcard character is "*". permission is an optional field containing any combination of the following characters: r the host can read sounds. w the host can write sounds. x the host can play, stop, pause, and continue sounds. This is normally called execute permission. m the host can monitor the audio stream written by rplayd to the audio device. "rx" permissions are used when no permissions are specified. EXAMPLE
# # All hosts have read access: # *:r # # Trusted hosts: # nice-guy.sdsu.edu:rwx friend.sdsu.edu:rwx amigo.sdsu.edu:rwx 130.191.224.224:rwx # # Hosts which can read and execute: # foo.bar.com:rx 130.190.*:rx 146.244.234.*:rx using.default.perms.edu # # Hosts which can monitor the audio stream # nsa.sdsu.edu:m FILES
/usr/local/etc/rplay.hosts SEE ALSO
rplayd(1) BUGS
The permissions for an "*" entry apply to all matching hosts. The order of this file does not matter. Specific hosts can have access dis- abled with entries like: bad.guy.edu: however, any matching "*" entries will still apply. 12/21/97 RPLAY.HOSTS(5)
All times are GMT -4. The time now is 01:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy