Search Results

Search: Posts Made By: Perderabo
13,947
Posted By Perderabo
The Thompson goto command was bizarre because it...
The Thompson goto command was bizarre because it was not a shell built-in. It was actually an external command. Decisions like this were made to get the thing to run in a 16 bit machine.

First...
Forum: Solaris 09-03-2014
6,429
Posted By Perderabo
Things are changing all the time. If you run...
Things are changing all the time. If you run prstat then you run ps you get two differtent snapshots of memory. Even if you run them more or less simultaneously they will not examine the processes...
5,742
Posted By Perderabo
The "let" command originated in ksh. Dave Korn...
The "let" command originated in ksh. Dave Korn considered it to be a mistake and very quickly developed the double parentheses notation to replace it. By the mid 1980's the advice was to not use...
Forum: Linux 08-20-2014
5,417
Posted By Perderabo
Try this: in modprobe.d create a new file called...
Try this: in modprobe.d create a new file called 8021q. In it, put the lines:
install 8021q /bin/true
install garp /bin/true


This tells the kernel to use non-standard versions of 8021q and...
Forum: Linux 08-19-2014
6,042
Posted By Perderabo
Suppose it did that. There are still errors you...
Suppose it did that. There are still errors you can make that render sudo usuable like "chmod 0 /usr/bin/sudo". As a sysadmin you need to be ready for that and be able to operate when sudo fails....
4,481
Posted By Perderabo
Well, see this thread...
Well, see this thread (https://www.unix.com/tips-and-tutorials/36711-whole-story-usr-bin-ksh.html) especially "Part 2 The Format of the #! Line"
4,481
Posted By Perderabo
See this thread...
See this thread (https://www.unix.com/unix-for-advanced-and-expert-users/243903-dot-sourcing-differences-ksh-aix-vs-linux-vs-solaris.html)
12,205
Posted By Perderabo
I would not cat the new certificate onto the end...
I would not cat the new certificate onto the end of the old certificate. I would rename the old certificate to a save file. Then I would just move the new certificate in place.
8,329
Posted By Perderabo
I am not really familiar with modern fortran. ...
I am not really familiar with modern fortran. But is not g++ a compiler for the C++ language? Maybe you should try a fortran compiler? To test my guess I wrote a little "hello world" program in...
4,952
Posted By Perderabo
IMHO, the best book ever written on the subject...
IMHO, the best book ever written on the subject is: C Programmer's Guide to Serial Communications (http://www.amazon.com/C-Programmers-Guide-Serial-Communications/dp/0672302861/)
4,481
Posted By Perderabo
ksh does indeed have a special way to deal with...
ksh does indeed have a special way to deal with child scripts that have no #! leading line. This introduces a number of special features that expands the traditional unix environment. These...
7,592
Posted By Perderabo
Read your putty documentation again. Chapter 9...
Read your putty documentation again. Chapter 9 describes using pagent to supply authentication. Once pagent is running you can do stuff like this:
C:\Windows\System32>
C:\Windows\System32>...
4,919
Posted By Perderabo
On my mgetty man page I see: -m...
On my mgetty man page I see:

-m 'expect send ...'
Set the "chat sequence" that is used to initialize the modem. For an empty expect part, use empty double
...
10,759
Posted By Perderabo
Core dump occur as default action of a few...
Core dump occur as default action of a few signals. The list is available with "man -s7 signal" on RedHat. You could install a signal handler to catch all those signals. It could then display...
6,825
Posted By Perderabo
It's probably too late to help SkySmart, but I...
It's probably too late to help SkySmart, but I thought that I would post a followup anyway. In another thread I saw Corona688 perform date arithmetic via the -d parameter to date. This led me to...
Forum: IP Networking 06-20-2014
11,029
Posted By Perderabo
Actually, nmap listens to ICMP during UDP scans...
Actually, nmap listens to ICMP during UDP scans primarily for ICMP unreachable messages. In theory, if you reach the system with a UDP packet, but the port the packet is addressed to is not...
27,975
Posted By Perderabo
I got hit with my ksh scripts just going from...
I got hit with my ksh scripts just going from RedHat 5 to RedHat 6. Yes, they changed the behavior of the builtin echo command. But they added a "-e" flag to get the old behavior. This means...
7,673
Posted By Perderabo
I see a couple of default for statments in there....
I see a couple of default for statments in there. Like this:rc_status ()
{
rc_check
_rc_status_ret=$_rc_status
local i
for i ; do
case "$i" in

That "for i" is going to...
Forum: Programming 05-30-2014
4,268
Posted By Perderabo
First, take a long hard long at the currdisk...
First, take a long hard long at the currdisk structure. If there is any chance that (double)currdisk->currangle and (double)currdisk->rotatetime overlap that is your problem. Having these overlap...
10,738
Posted By Perderabo
There is no way for you to delete you own posts. ...
There is no way for you to delete you own posts. Your posts are mainly questions. And most of them got an expert answer. The resulting thread is now part of our permament knowledge base. Other...
Forum: Solaris 05-22-2014
6,261
Posted By Perderabo
Well, it gets mad right after it cannot open...
Well, it gets mad right after it cannot open those device files. I would check the permissions on them. They're supposed to be 666.

#
# ls -l /dev/udp /dev/tcp /dev/ticlts /dev/ticotsord...
8,468
Posted By Perderabo
This has happened to me on several occasions. ...
This has happened to me on several occasions. Not a timeout per se, but the connection drops or something like that. There are ways to make the the rm process nearly immortal. But I simply...
3,866
Posted By Perderabo
Actually, most ftp clients support a facility...
Actually, most ftp clients support a facility called macros. You get into interactive mode and define a macro with the macdef command. It is a very limited and rarely used facility. I just checked...
Forum: What is on Your Mind? 05-21-2014
1,205
Posted By Perderabo
Depending on your threat model there may be...
Depending on your threat model there may be little problem in writing down passwords. My company is under near continuous assault from countries like China and North Korea. We are required to use...
Forum: AIX 05-20-2014
10,120
Posted By Perderabo
If there was any such thing as ideal limits, the...
If there was any such thing as ideal limits, the system would be locked into using the ideal limits and there would be no adjustment you could make. That said, a couple of issues do come to mind......
Showing results 1 to 25 of 241

 
All times are GMT -4. The time now is 08:07 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy