05-02-2006
I see you have provided great detail and performed a lot of research before asking such a question.
Start here
#!/bin/ksh
I figured and equal answer for an equal question.
-X
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other.
What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies
2. Filesystems, Disks and Memory
I was wondering if anyone knew of any good firewall softwares to run on open bsd. I'm currently running ip chains but I'm looking for easier to configure.
thanks (1 Reply)
Discussion started by: shadieshad
1 Replies
3. Cybersecurity
I am using SCO unix 5.0.4 is there any possibility to create firewall in this? scondly how to connect it to internet i mean thru ppp connection what is command a or dialer actually i m getting confused sometimes ppp dials but disconnects ? pl help me from scratch (0 Replies)
Discussion started by: zaheerkhan
0 Replies
4. Shell Programming and Scripting
Hi ,
I am having one situation in which I need to run some simple unix commands after doing "chroot" command in a shell script. Which in turn creates a new shell.
So scenario is that
- I need to have one shell script which is ran as a part of crontab
- in this shell script I need to do a... (2 Replies)
Discussion started by: hkapil
2 Replies
5. AIX
Hi,
Please give me the detailed Differences between writing Unix Shell script and AIX Shell Scripts. Thanks in advance..... (0 Replies)
Discussion started by: haroonec
0 Replies
6. Shell Programming and Scripting
So, I have a free shell from an online provider which offer IRC access, I am behind a firewall blocking all IRC ports @ work, how can I use the Shell to get on IRC from work? What do I need to setup on the shell to be able to connect to the shell on the ssh port which allows connections from work,... (10 Replies)
Discussion started by: KromiX
10 Replies
7. Cybersecurity
Hi Gurus,
I am new to UNIX Admin and i am trying to do one software installation.
During installation process, i need to disable the existing firewall settings. I am not much aware about the UNIX Firewall settings.
Can any one help me to find out whether the firewall is ON or not. If it is... (1 Reply)
Discussion started by: Raamc
1 Replies
8. UNIX for Dummies Questions & Answers
I was given this assignment and part of it was to mention firewalls available on UNIX(ex. solaris) and Linux plaforms.
First I would like to ask what is the difference between Unix and Linux. And also can please tell me firewalls are available on these platforms?
Thank you before hand. (1 Reply)
Discussion started by: chrisd
1 Replies
9. UNIX for Dummies Questions & Answers
our WBM is not working so I cannot enter firewall entries so I would like to know how to do it using unix commands after I have logged in via telnet:wall: (4 Replies)
Discussion started by: kool
4 Replies
10. Shell Programming and Scripting
Please share the doc asap as very urgently required. (1 Reply)
Discussion started by: 24ajay
1 Replies
CHING(6) BSD Games Manual CHING(6)
NAME
ching -- the book of changes and other cookies
SYNOPSIS
ching [hexagram]
DESCRIPTION
The I Ching or Book of Changes is an ancient Chinese oracle that has been in use for centuries as a source of wisdom and advice.
The text of the oracle (as it is sometimes known) consists of sixty-four hexagrams, each symbolized by a particular arrangement of six
straight (---) and broken (- -) lines. These lines have values ranging from six through nine, with the even values indicating the broken
lines.
Each hexagram consists of two major sections. The Judgement relates specifically to the matter at hand (e.g., ``It furthers one to have
somewhere to go.'') while the Image describes the general attributes of the hexagram and how they apply to one's own life (``Thus the
superior man makes himself strong and untiring.'')
When any of the lines have the values six or nine, they are moving lines; for each there is an appended judgement which becomes significant.
Furthermore, the moving lines are inherently unstable and change into their opposites; a second hexagram (and thus an additional judgement)
is formed.
Normally, one consults the oracle by fixing the desired question firmly in mind and then casting a set of changes (lines) using yarrow-stalks
or tossed coins. The resulting hexagram will be the answer to the question.
Using an algorithm suggested by S. C. Johnson, the UNIX oracle simply reads a question from the standard input (up to an EOF) and hashes the
individual characters in combination with the time of day, process id and any other magic numbers which happen to be lying around the system.
The resulting value is used as the seed of a random number generator which drives a simulated coin-toss divination. The answer is then piped
through nroff(1) for formatting and will appear on the standard output.
For those who wish to remain steadfast in the old traditions, the oracle will also accept the results of a personal divination using, for
example, coins. To do this, cast the change and then type the resulting line values as an argument.
The impatient modern may prefer to settle for Chinese cookies; try fortune(6).
DIAGNOSTICS
The great prince issues commands,
Founds states, vests families with fiefs.
Inferior people should not be employed.
SEE ALSO
It furthers one to see the great man.
BUGS
Waiting in the mud
Brings about the arrival of the enemy.
If one is not extremely careful,
Somebody may come up from behind and strike him.
Misfortune.
BSD
May 31, 1993 BSD