07-09-2002
Need your help and opinion
Hey all,
I'm brand new to Unix/Linux and have a couple of questions. I own a small education/consulting company that has a staff of approx. 50 employees. Most our work is geared towards the office-style environment (i.e. Word, Excel, Powerpoint, etc.). There are also some C and Java programmers that help support the office staff. I am seeking to establish a network environment that is very stable and reliable.
My company currently has Pentium machines (233) with 64 MB of memory. I know that they will most probably have to upgrade someday but am trying to avoid buying all new hardware. Some of the machines are running windows while others are Macintosh. As a side note, I would also one day like to have my own web server.
I would like to have opinions/suggestions regarding whether or not to use Windows NT or UNIX/LINUX as the server for the backbone of my organization. What are the advantages/disadvantages of one over the other? What are other companies using?
Like I said, you input is greatly appreciated before I spend so much money.
Thanks,
Dennie1
10 More Discussions You Might Find Interesting
1. Solaris
Ladies/Gentlemen,
I am looking for a web-based tool to keep track of my Sun inventory. The following list of fields are fields I would like to store: Root Passwd (needs to be secure) / Hostid / Console Port / IP Address / Platform / Application / Hostname . . . you get the point.
Do any of... (4 Replies)
Discussion started by: pc9456
4 Replies
2. Post Here to Contact Site Administrators and Moderators
Hi,
I am new at this site and at unix. I was reading some answers that the administrators and moderators have posted to others, and sometimes I feel like their a little sarcastic.
I am asking just to be patient to me, I know nothing about unix but I do want to learn, and I think that positive... (7 Replies)
Discussion started by: HN19
7 Replies
3. UNIX for Dummies Questions & Answers
i'm trying to figure out a script that uses sed, and i'm not totally sure if it does what I think it does.
The script...
- takes in 3 inputs, $1, $2 are names. $3 is a file.
- filename is a file.
Here is what I'm trying to figure out:
cat $3 | grep "id17" > var2
sed "s|@@.*||g" var2 >... (1 Reply)
Discussion started by: gammaman
1 Replies
4. UNIX for Dummies Questions & Answers
Hello,
I get the following in one of my error logs:
Device /dev/sda, SATA disks accessed
via libata are not currently supported by smartmontools. When libata is
given an ATA
pass-thru ioctl() then an additional '-d libata' device type will be
added to smartmontools.
---------------
I... (0 Replies)
Discussion started by: mojoman
0 Replies
5. UNIX and Linux Applications
Hello,
I get the following in one of my error logs:
Device /dev/sda, SATA disks accessed
via libata are not currently supported by smartmontools. When libata is
given an ATA
pass-thru ioctl() then an additional '-d libata' device type will be
added to smartmontools.
---------------
... (1 Reply)
Discussion started by: mojoman
1 Replies
6. UNIX for Advanced & Expert Users
This perhaps does not belong in ths category; apologies, however, we have a heated debate going and your input will decide the result.
Should UNIX (HP, AIX, etc) be rebooted following a monthly cycle (Every month, or a qtr, etc.). We have some UX admins (grumps) who say they have seen a UX... (6 Replies)
Discussion started by: rsheikh
6 Replies
7. UNIX for Advanced & Expert Users
Hello all,
I want to deny any torrents passing thru linux box that are NOT encrypted. My ISP is doing packet inspection and gives warnings.
I'd like to allow torrents when client sets encryption.
Any thoughts? (5 Replies)
Discussion started by: darkman_hr
5 Replies
8. What is on Your Mind?
Dear Forum staff / Advisors / members ,
I am having something in my mind, about Linux / Unix possible Interview questions collections, I guess if I post them here,which might be useful for our members and for students, and in meantime we can discuss also about those questions, what's your... (4 Replies)
Discussion started by: Akshay Hegde
4 Replies
9. Shell Programming and Scripting
:wall:I've this simple code:
STF=/opt/aaa
cat $STF | nice sort -u > $STF.new && mv $STF.new $STF
Which works until today. What happened is that this script has been corrupted the FS, so I've to use fschk to repair the filesystem.
I presume the move command executed just a little too early... (1 Reply)
Discussion started by: accolito
1 Replies
10. AIX
Why Do We Need Root on the HMC?
In this article in IBMSystems Magazine Rob McNelly asked the question
Why Don't We Have Root on the HMC?
and he goes on to justify why we indeed shouldn't have root - kinda. I think his arguments are not as valid as he perhaps thinks they are and what's more... (11 Replies)
Discussion started by: bakunin
11 Replies
LEARN ABOUT FREEBSD
finger
FINGER(1) BSD General Commands Manual FINGER(1)
NAME
finger -- user information lookup program
SYNOPSIS
finger [-46gklmpsho] [user ...] [user@host ...]
DESCRIPTION
The finger utility displays information about the system users.
Options are:
-4 Forces finger to use IPv4 addresses only.
-6 Forces finger to use IPv6 addresses only.
-s Display the user's login name, real name, terminal name and write status (as a ``*'' before the terminal name if write permission is
denied), idle time, login time, and either office location and office phone number, or the remote host. If -o is given, the office
location and office phone number is printed (the default). If -h is given, the remote host is printed instead.
Idle time is in minutes if it is a single integer, hours and minutes if a ``:'' is present, or days if a ``d'' is present. If it is
an ``*'', the login time indicates the time of last login. Login time is displayed as the day name if less than 6 days, else month,
day; hours and minutes, unless more than six months ago, in which case the year is displayed rather than the hours and minutes.
Unknown devices as well as nonexistent idle and login times are displayed as single asterisks.
-h When used in conjunction with the -s option, the name of the remote host is displayed instead of the office location and office
phone.
-o When used in conjunction with the -s option, the office location and office phone information is displayed instead of the name of the
remote host.
-g This option restricts the gecos output to only the users' real name. It also has the side-effect of restricting the output of the
remote host when used in conjunction with the -h option.
-k Disable all use of the user accounting database.
-l Produce a multi-line format displaying all of the information described for the -s option as well as the user's home directory, home
phone number, login shell, mail status, and the contents of the files .forward, .plan, .project and .pubkey from the user's home
directory.
If idle time is at least a minute and less than a day, it is presented in the form ``hh:mm''. Idle times greater than a day are pre-
sented as ``d day[s]hh:mm''.
Phone numbers specified as eleven digits are printed as ``+N-NNN-NNN-NNNN''. Numbers specified as ten or seven digits are printed as
the appropriate subset of that string. Numbers specified as five digits are printed as ``xN-NNNN''. Numbers specified as four dig-
its are printed as ``xNNNN''.
If write permission is denied to the device, the phrase ``(messages off)'' is appended to the line containing the device name. One
entry per user is displayed with the -l option; if a user is logged on multiple times, terminal information is repeated once per
login.
Mail status is shown as ``No Mail.'' if there is no mail at all, ``Mail last read DDD MMM ## HH:MM YYYY (TZ)'' if the person has
looked at their mailbox since new mail arriving, or ``New mail received ...'', ``Unread since ...'' if they have new mail.
-p Prevent the -l option of finger from displaying the contents of the .forward, .plan, .project and .pubkey files.
-m Prevent matching of user names. User is usually a login name; however, matching will also be done on the users' real names, unless
the -m option is supplied. All name matching performed by finger is case insensitive.
If no options are specified, finger defaults to the -l style output if operands are provided, otherwise to the -s style. Note that some
fields may be missing, in either format, if information is not available for them.
If no arguments are specified, finger will print an entry for each user currently logged into the system.
The finger utility may be used to look up users on a remote machine. The format is to specify a user as ``user@host'', or ``@host'', where
the default output format for the former is the -l style, and the default output format for the latter is the -s style. The -l option is the
only option that may be passed to a remote machine.
If the file .nofinger exists in the user's home directory, and the program is not run with superuser privileges, finger behaves as if the
user in question does not exist.
The optional finger.conf(5) configuration file can be used to specify aliases. Since finger is invoked by fingerd(8), aliases will work for
both local and network queries.
ENVIRONMENT
The finger utility utilizes the following environment variable, if it exists:
FINGER This variable may be set with favored options to finger.
FILES
/etc/finger.conf alias definition data base
/var/log/utx.lastlogin last login data base
SEE ALSO
chpass(1), w(1), who(1), finger.conf(5), fingerd(8)
D. Zimmerman, The Finger User Information Protocol, RFC 1288, December, 1991.
HISTORY
The finger command appeared in 3.0BSD.
BUGS
The finger utility does not recognize multibyte characters.
BSD
January 21, 2010 BSD