Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

spectool_raw(1) [debian man page]

SPECTOOLS(1)						      General Commands Manual						      SPECTOOLS(1)

NAME
spectool_raw -- Utility for developing other tools using the Wi-Spy SYNOPSIS
spectool_raw [-n network server] [-b] DESCRIPTION
spectool_raw is a simple tool which extracts data from the Wi-Spy device. It can be used to create other tools or scripts. OPTIONS
This program follows the usual GNU command line syntax, with long options starting with two dashes (`-'). A summary of options is included below. -h --help Show summary of options. -n tcp://host:port --net tcp://host:port Connect to network server instead of local USB devices. -b --broadcast Listen for (and connect to) broadcast servers instead of using local USB devices. SEE ALSO
spectool_gtk (1), spectool_curses (1), spectool_net (1). AUTHOR
This manual page was written by Francois Marier <francois@debian.org> for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 3 any later version pub- lished by the Free Software Foundation. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL. SPECTOOLS(1)

Check Out this Related Man Page

CONFIG-MANAGER(1)					      General Commands Manual						 CONFIG-MANAGER(1)

NAME
cm -- Work with configs. SYNOPSIS
cm [-a] [-v] [-d] [-s] [-p] [-r] [-n] DESCRIPTION
This manual page documents briefly the cm tool. This manual page was written for the Debian distribution because the original program does not have a manual page. cm is a program that manages directory trees. The components of a directory tree are specified by a recipe (also known as a config). A recipe can specify that the directories components should be retrieved via Arch, CVS, HTTP or FTP as appropriate. OPTIONS
These programs follow the usual GNU command line syntax, with long options starting with two dashes (`-'). A summary of options is included below. For a complete description, see the Info files. -h --help Show summary of options. -v --version Show version of program. SEE ALSO
tla (1) AUTHOR
This manual page was written by Anand Kumria wildfire@progsoc.org for the Debian system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 any later version published by the Free Software Foundation. On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL. CONFIG-MANAGER(1)
Man Page

4 More Discussions You Might Find Interesting

1. IP Networking

tcp/ip network

Hi, Can someone tell me how to set up a basic tcp/ip network on unix, so windows computers can ping it? Thnx, Edwin (10 Replies)
Discussion started by: edw1ns
10 Replies

2. Infrastructure Monitoring

How to get server monitored

Hi All, I have a central monitoring server which monitors all servers, network devices of the network. The network monitoring tools is an agentless tool which monitors the servers on the behalf of SNMP traps sent by all servers. Now when I try for Sun servers to get monitored by the same... (2 Replies)
Discussion started by: naw_deepak
2 Replies

3. Shell Programming and Scripting

Help with shell script to check the tcp network connectivity between server

Hello, I have a requirement to check the tcp network connectivity between server it's running on and the list of host's and ports combination. i have written the below code but it doesn't work, but when i execute the nc command outside the script it works fine. please help me where i am... (8 Replies)
Discussion started by: sknovice
8 Replies

4. OS X (Apple)

Let your iMac/MBP detect a burglar whilst idle...

Hi folks... (Apologies for typos.) I have been working on a very simple MacBook_Pro/iMac centric project. I have called it Spy . If you just want to test for fun you only need ./Spy and this defaults to a 5 second video with Medium sensitivity from the working directory whre Spy is. (Just... (1 Reply)
Discussion started by: wisecracker
1 Replies