Sponsored Content
The Lounge War Stories Anger management at work without others finding out Post 302714657 by DGPickett on Friday 12th of October 2012 11:42:48 AM
Old 10-12-2012
Just keep reporting root cause analysis! Implement any necessary tracing to discern individual responsibility.

Do not let them control the quality of your work. You need good standards and habits for the next job or next manager.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Script doesn't work, but commands inside work

Howdie everyone... I have a shell script RemoveFiles.sh Inside this file, it only has two commands as below: rm -f ../../reportToday/temp/* rm -f ../../report/* My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies

2. Shell Programming and Scripting

finding duplicate files by size and finding pattern matching and its count

Hi, I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern. Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies

3. UNIX and Linux Applications

Password management / centralized password management

Hello all, I need help for build server call as Password management / centralized password management server. My situation and example: I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies

4. IP Networking

NIC will not work, but it did work.

I have a client machine that was built and loaded with SCO UNIX 2.1.3, (yes it is old). The machine worked fine on the closed network that I tested on in my shop. I then had to change it to the network that it would be connected to. Below is the host file, router and subnet mask file that I usually... (0 Replies)
Discussion started by: NC user
0 Replies

5. IP Networking

IP Management

Hello all, I was wondering which way do you use to manage you IPs? For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all. But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies

6. Shell Programming and Scripting

My script work on Linux but not work in sunos.

My script work on Linux but not work in sun os. my script. logFiles="sentLog1.log sentLog2.log" intial_time="0 0" logLocation="/usr/local/tomcat/logs/" sleepTime=600 failMessage=":: $(tput bold)Log not update$(tput rmso) = " successMessage="OK" arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies

7. IP Networking

Discussion at work, would a router work pluging a cable in wan1 and lan1?

hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view situation a router, with linux of some sort, dhcp client requesting for ip in wan1 (as usual with wan ports) dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies

8. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
yum-verify(1)															     yum-verify(1)

NAME
yum verify plugin SYNOPSIS
yum [options] verify [package ...] DESCRIPTION
This plugin extends yum with some commands that give verification information on the installed system, much like rpm -V. You can change how the verification is done and which files it applies to. added yum commands are: * verify * verify-rpm * verify-all all of which take the same arguments as the list yum command, obviously you can only verify packages that are installed on the system. verify Is the generic verification command, and is intended to give the most useful output. It removes all false matches due to multilib and ignores changes to configuration files by default. verify-rpm Is meant to be 100% compatible with rpm -V output, and any differences should be considered as bugs. verify-all Is used to list all the differences, including some that rpm itself will ignore. GENERAL OPTIONS
These are the options added to yum that are available in the verify commands. They are: --verify-filenames This option is used to limit the filenames that the packages will perform verification. --verify-configuration-files This option is only useful in the generic verify command, and will enable/disable verification of files that are tagged as configu- ration files. EXAMPLES
To do the same as rpm -Va, use: yum verify-rpm To verify the packages starting with the name yum, use: yum verify 'yum*' To verify the binaries that are in a bin directory, use: yum verify --verify-filenames='*bin/*' To verify all include files, Eg. for multilib problems, use: yum verify-all --verify-filenames='/usr/include/*' SEE ALSO
yum (8) yum.conf (5) the verify.conf file in /etc/yum/plugins.d AUTHORS
James Antill <james.antill@redhat.com>. BUGS
Currently yum-verify does not do verify-script checking or dependency checking, only file checking. Should you find any other bugs, you should first consult the FAQ section on http://yum.baseurl.org/wiki/Faq and if unsuccessful in finding a resolution contact the mailing list: yum-devel@lists.baseurl.org. To file a bug use http://bugzilla.redhat.com for Fedora/RHEL/Centos related bugs and http://yum.baseurl.org/report for all other bugs. James Antill 01 March 2008 yum-verify(1)
All times are GMT -4. The time now is 03:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy