10 More Discussions You Might Find Interesting
1. UNIX and Linux Applications
Hi all,
i face an error related to my server ""it's running server"" when i use sqlplus command
$ sqlplus
bash: sqlplus: command not found
the data base is up and running i just need to access the sqlplus to import the dump file as a daily backup.
i already check the directory... (4 Replies)
Discussion started by: clerck
4 Replies
2. UNIX for Dummies Questions & Answers
How to use "mailx" command to do e-mail reading the input file containing email address, where column 1 has name and column 2 containing “To” e-mail address
and column 3 contains “cc” e-mail address to include with same email.
Sample input file, email.txt
Below is an sample code where... (2 Replies)
Discussion started by: asjaiswal
2 Replies
3. UNIX for Dummies Questions & Answers
As in the title, how to clear the history entries?
For eg: if i enter history, series of linux commands getting displayed from day 1. I need to clear those entries and want linux commands to be stored freshly.
Thanks in advance (6 Replies)
Discussion started by: karthick nath
6 Replies
4. Shell Programming and Scripting
I want to list all files/lines which except those which contain the pattern ' /proc/' OR ' /sys/' (mind the leading blank).
In a first approach I coded:
find / -exec ls -ld {} | grep -v ' /proc/| /sys/' \; > /tmp/list.txt
But this doesn't work. I got an error (under Ubuntu):
grep:... (5 Replies)
Discussion started by: pstein
5 Replies
5. Shell Programming and Scripting
Hi,
I have line in input file as below:
3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL
My expected output for line in the file must be :
"1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL"
Can someone... (7 Replies)
Discussion started by: shis100
7 Replies
6. HP-UX
hey!guys!
i have a HP rx8640 with a EMC CX600
when i run
# powermt display
showed
Symmetrix logical device count=0
CLARiiON logical device count=85
Hitachi logical device count=0
Invista logical device count=0
HP xp logical device count=0
Ess logical device count=0
HP HSx... (1 Reply)
Discussion started by: JoyOnLine
1 Replies
7. UNIX for Dummies Questions & Answers
Hi!!..
I would like to know what is maximum character size for a command in the "sh" or "bourne" shell?
Thanks in advance..
Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies
8. UNIX for Advanced & Expert Users
hi,
I have a problem about the Oracle related components. I'm not able to find any answer yet, and waiting for your responses...
Here is the configuration of my system:
* an IBM P550 machine,
* an AIX 5.3 running on it and
* an oracle database, already installed on it.
The problem (or... (1 Reply)
Discussion started by: talipk
1 Replies
9. UNIX and Linux Applications
hi,
I have
* an IBM P550 machine,
* an AIX 5.3 running on it and
* an oracle database, already installed on it.
The problem (or question of my own) is:
Oracle tns listener, "CT_LISTENER", and the enterprise manager (EM) of the instance, which is uniq instance and called... (0 Replies)
Discussion started by: talipk
0 Replies
10. UNIX for Dummies Questions & Answers
Hi All,
I am trying to schedule a one time job using the at command with the help of shell script for my project. The shell script should take a parameter as a command line argument from the at command itself. Is it possible to take a command line parameter for a shell script in the command... (3 Replies)
Discussion started by: Mohanraj
3 Replies
XHOST(1) General Commands Manual XHOST(1)
NAME
xhost - server access control program for X
SYNOPSIS
xhost [[+-]name ...]
DESCRIPTION
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case
of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environ-
ment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based
mechanism or use the hooks in the protocol for passing other authentication data to the server.
OPTIONS
Xhost accepts the following command line options described below. For security, the options that effect access control may only be run
from the "controlling host". For workstations, this is the same machine as the server. For X terminals, it is the login host.
-help Prints a usage message.
[+]name The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a host name or
a user name.
-name The given name is removed from the list of allowed to connect to the server. The name can be a host name or a user name. Existing
connections are not broken, but new connection attempts will be denied. Note that the current machine is allowed to be removed;
however, further connections (including attempts to add it back) will not be permitted. Resetting the server (thereby breaking all
connections) is the only way to allow local connections again.
+ Access is granted to everyone, even if they aren't on the list (i.e., access control is turned off).
- Access is restricted to only those on the list (i.e., access control is turned on).
nothing If no command line arguments are given, a message indicating whether or not access control is currently enabled is printed, fol-
lowed by the list of those allowed to connect. This is the only option that may be used from machines other than the controlling
host.
NAMES
A complete name has the syntax ``family:name'' where the families are as follows:
inet Internet host (IPv4)
inet6 Internet host (IPv6)
dnet DECnet host
nis Secure RPC network name
krb Kerberos V5 principal
local contains only one name, the empty string
The family is case insensitive. The format of the name varies with the family.
When Secure RPC is being used, the network independent netname (e.g., "nis:unix.uid@domainname") can be specified, or a local user can be
specified with just the username and a trailing at-sign (e.g., "nis:pat@").
For backward compatibility with pre-R6 xhost, names that contain an at-sign (@) are assumed to be in the nis family. Otherwise they are
assumed to be Internet addresses. If compiled to support IPv6, then all IPv4 and IPv6 addresses returned by getaddrinfo(3) are added to the
access list in the appropriate inet or inet6 family.
DIAGNOSTICS
For each name added to the access control list, a line of the form "name being added to access control list" is printed. For each name
removed from the access control list, a line of the form "name being removed from access control list" is printed.
FILES
/etc/X*.hosts
SEE ALSO
X(7), Xsecurity(7), Xserver(1), xdm(1), getaddrinfo(3)
ENVIRONMENT
DISPLAY to get the default host and display to use.
BUGS
You can't specify a display on the command line because -display is a valid command line argument (indicating that you want to remove the
machine named ``display'' from the access list).
The X server stores network addresses, not host names. This is not really a bug. If somehow you change a host's network address while the
server is still running, xhost must be used to add the new address and/or remove the old address.
AUTHORS
Bob Scheifler, MIT Laboratory for Computer Science,
Jim Gettys, MIT Project Athena (DEC).
XFree86 Version 4.7.0 XHOST(1)