07-17-2002
more ip nrs
OK thanks for your input.
I assumed this is not the correct way, but the current tcp/ip stacks don't seem to have a problem with it.
In early Unix versions I was told this was not correct but exactly reason and background was I don't know.
I was thinking along the line of a common broadcast address and the system was confused. But the MAC address can be faked so this might be the explanation of why it is possible today.
Cheers
R
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have two files one (numbers file)contains the numbers(approximately 30000) and the other file(record file) contains the records(approximately 40000)which may or may not contain the numbers from that file.
I want to seperate the records which has the field 1=(any of the number from numbers... (15 Replies)
Discussion started by: Shiv@jad
15 Replies
2. IP Networking
hello i have a ubuntu ssh server that i can acess from any of my comnputers but only if they are on the same wireless network as the server. i tested trhis my tehtehring my samsung blackjack to my windows partition and installing openssh to windows it works when windows is on the wireless but no... (1 Reply)
Discussion started by: old noob
1 Replies
3. Shell Programming and Scripting
Howdy experts,
We have some ranges of number which belongs to particual group as below.
GroupNo StartRange EndRange
Group0125 935300 935399
Group2006 935400 935476
937430 937459
Group0324 935477 935549
... (6 Replies)
Discussion started by: thepurple
6 Replies
4. UNIX for Dummies Questions & Answers
hey,
I have a file with numbers in US notation (1,000,000.00) as well as european notation (1.000.000,00)
i want all the numbers to be in european notation.
the numbers are in a text file, so to prevent that the regex also changes the commas in a sentence/text i thought of:
sed 's/,/\./'... (2 Replies)
Discussion started by: FOBoy
2 Replies
5. Shell Programming and Scripting
Hello All,
I am having problem to find what is the smallest number from 90% of highest numbers from all numbers in file. I am having file with thousands of lines and hundreds of columns.
I am familiar mainly with bash but I am open to whatever suggestion witch will lead to the solutions.
If I... (11 Replies)
Discussion started by: Apfik
11 Replies
6. Solaris
i need to configure a zone to use different interface (bge2) than global and have connected to completely different network switch & to use its own defaultrouter and hosts file .. is it possible ..if so ..how ?
Thanks (9 Replies)
Discussion started by: skamal4u
9 Replies
7. UNIX for Dummies Questions & Answers
##### (0 Replies)
Discussion started by: lucasvs
0 Replies
8. Red Hat
Hi,
I have 2 machines in production environment:
1. redhat machine for application
2. DB machine (oracle)
The application doing a lot of small read&writes from and to the DB machine.
The problem is that after some few hours the network from the application to the DB becomes very slow and... (4 Replies)
Discussion started by: moshesa
4 Replies
9. UNIX for Beginners Questions & Answers
Hi!
I found and then adapt the code for my pipeline...
awk -F"," -vOFS="," '{printf "%0.2f %0.f\n",$2,$4}' xxx > yyy
I add -F"," -vOFS="," (for input and output as csv file) and I change the columns and the number of decimal...
It works but I have also some problems... here my columns
... (7 Replies)
Discussion started by: echo manolis
7 Replies
faked(1) Debian GNU/Linux manual faked(1)
NAME
faked - daemon that remembers fake ownership/permissions of files manipulated by fakeroot processes.
SYNOPSIS
faked [--debug] [--foreground] [--cleanup] [--key msg-key] [--load] [--save-file save-file] [--port TCP-port]
DESCRIPTION
If a fakeroot process wants to change the ownership of a file, then faked is the process that remembers that new owner. If later the same
fakeroot process does a stat() for that filename, then the libfakeroot wrapped stat() call will first ask faked for the fake ownership etc
of that file, and then report it.
OPTIONS
--debug
Print debugging information on stderr.
--foreground
Don't fork into the background.
--cleanup number
Cleanup the semaphores.
--key key-number
Don't allocate a new communication channel, but use channel specified by key. (If the specified channel doesn't exist, it's cre-
ated).
--save-file save-file
Save the environment to save-file on exit.
--load Load a previously saved environment from the standard input.
--unknown-is-real
Use real ownership of previously-unknown files instead of setting them to root:root.
--port tcp-port
Use TCP port tcp-port.
BUGS
None so far. Be warned, though: although I've written quite a few much larger (and smaller) programs, I've never written anything that was
as tiny as fakeroot, had as many bugs as fakeroot, and still was as usable as, say, fakeroot version 0.0_3, the first version that could be
used to build itself.
COPYING
fakeroot is distributed under the GNU General Public License. (GPL 2.0 or greater).
AUTHORS
joost witteveen
<joostje@debian.org>
Clint Adams
<clint@debian.org>
Timo Savola
MANUAL PAGE
mostly by J.H.M. Dassen <jdassen@debian.org> mods/additions by joost and Clint.
SEE ALSO
fakeroot(1), dpkg-buildpackage(1), debuild(1) /usr/share/doc/fakeroot/DEBUG
Debian Project 17 June 2004 faked(1)