10-09-2002
Also, some platforms (I have only seen it on Linux) have the 'locate' command which can be less resource intensive.
8 More Discussions You Might Find Interesting
1. Cybersecurity
I would like to give execution rights for a script to one user. (that's the easy part...)
When that user is running the script, I would like the effective user ID to be that of the file-owner. Is this possible? (6 Replies)
Discussion started by: hilmel
6 Replies
2. UNIX for Dummies Questions & Answers
Hey all, I'm glad to have found this forum as I'm trying to dive head first into Solaris 8 - been working with it for a few months now and am finally getting a bit comfortable with the layout and concepts. In any case, on to the questions... :D
I was wondering how I would go about displaying... (3 Replies)
Discussion started by: QuadMonk
3 Replies
3. UNIX for Dummies Questions & Answers
Here is my situation. On a RedHat 7.3 box, I have a user named jody.
When I log in with jody and type in "id", I get the expected output:
uid=1(jody) gid=1(jody) groups=1(jody), 510(test)
However, I cannot figure which "id" option allows me to change the effective gid. I tried the options... (2 Replies)
Discussion started by: Jody
2 Replies
4. Shell Programming and Scripting
I am dealing with a very large firewall logfile (more than 10G),
the logfile like this
*snip*
Nov 9 10:12:01 testfirewall root:
Nov 9 10:12:01 testfirewall root: 0:00:11 accept testfw01-hme0 >hme0 proto: icmp;
src: test001.example.net; dst: abc.dst.net; rule: 1; icmp-type: 8;... (8 Replies)
Discussion started by: fedora
8 Replies
5. UNIX for Dummies Questions & Answers
Can anyone explain me in details of Real and Effective IDs (6 Replies)
Discussion started by: kkalyan
6 Replies
6. UNIX for Dummies Questions & Answers
Hello all.
Despite the exec man page, the exec system call seems to turn my effective-user-id into my real-user-id.
I coded and compiled 2 very simple c programs as user 1 (uid=501)
The first one (A) prints real and effective user IDs and then execs the second one (B), which in turn prints... (7 Replies)
Discussion started by: oviv
7 Replies
7. Cybersecurity
I was looking for a good list of words to exclude people from using as passwords, i.e. those that could be guessed easily. I'm working through a whole bunch of suggestions from skullsecurity.org, but I managed to find this page that seems to suggest I have more options than I thought. :b:
I... (1 Reply)
Discussion started by: rbatte1
1 Replies
8. Programming
See the following code:
#include<iostream>
using namespace std;
class Uncopyable
{
protected:
Uncopyable(){cout<<"hehe\n";}
~Uncopyable(){}
private:
Uncopyable(const Uncopyable &rhs){cout<<"oooops\n";};
Uncopyable& operator=(const Uncopyable &rhs);
};
class Dog :... (5 Replies)
Discussion started by: vistastar
5 Replies
LEARN ABOUT DEBIAN
search.h
search.h(3HEAD) Headers search.h(3HEAD)
NAME
search.h, search - search tables
SYNOPSIS
#include <search.h>
DESCRIPTION
The <search.h> header defines the ENTRY type for structure entry, which includes the following members:
char *key
void *data
and defines ACTION and VISIT as enumeration data types through type definitions as follows:
enum { FIND, ENTER } ACTION;
enum { preorder, postorder, endorder, leaf } VISIT;
The size_t type is defined as described in <sys/types.h>. See types.h(3HEAD).
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Standard |
+-----------------------------+-----------------------------+
SEE ALSO
hsearch(3C), insque(3C), lsearch(3C), tsearch(3C), types.h(3HEAD), attributes(5), standards(5)
SunOS 5.10 10 Sep 2004 search.h(3HEAD)