Sponsored Content
Top Forums Shell Programming and Scripting Configure Firewall in unix from shell script Post 302072418 by x96riley3 on Tuesday 2nd of May 2006 04:51:34 PM
Old 05-02-2006
I see you have provided great detail and performed a lot of research before asking such a question.

Start here

#!/bin/ksh


I figured and equal answer for an equal question.

-X
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how to configure a linux box as a firewall using iptables

I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other. What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies

2. Filesystems, Disks and Memory

firewall for unix systems

I was wondering if anyone knew of any good firewall softwares to run on open bsd. I'm currently running ip chains but I'm looking for easier to configure. thanks (1 Reply)
Discussion started by: shadieshad
1 Replies

3. Cybersecurity

Firewall in SCO unix 5.0.4

I am using SCO unix 5.0.4 is there any possibility to create firewall in this? scondly how to connect it to internet i mean thru ppp connection what is command a or dialer actually i m getting confused sometimes ppp dials but disconnects ? pl help me from scratch (0 Replies)
Discussion started by: zaheerkhan
0 Replies

4. Shell Programming and Scripting

How to run unix commands in a new shell inside a shell script?

Hi , I am having one situation in which I need to run some simple unix commands after doing "chroot" command in a shell script. Which in turn creates a new shell. So scenario is that - I need to have one shell script which is ran as a part of crontab - in this shell script I need to do a... (2 Replies)
Discussion started by: hkapil
2 Replies

5. AIX

Difference between writing Unix Shell script and AIX Shell Scripts

Hi, Please give me the detailed Differences between writing Unix Shell script and AIX Shell Scripts. Thanks in advance..... (0 Replies)
Discussion started by: haroonec
0 Replies

6. Shell Programming and Scripting

How to setup a shell to use IRC behind firewall help

So, I have a free shell from an online provider which offer IRC access, I am behind a firewall blocking all IRC ports @ work, how can I use the Shell to get on IRC from work? What do I need to setup on the shell to be able to connect to the shell on the ssh port which allows connections from work,... (10 Replies)
Discussion started by: KromiX
10 Replies

7. Cybersecurity

Disable FIREWALL in UNIX

Hi Gurus, I am new to UNIX Admin and i am trying to do one software installation. During installation process, i need to disable the existing firewall settings. I am not much aware about the UNIX Firewall settings. Can any one help me to find out whether the firewall is ON or not. If it is... (1 Reply)
Discussion started by: Raamc
1 Replies

8. UNIX for Dummies Questions & Answers

Firewall on UNIX

I was given this assignment and part of it was to mention firewalls available on UNIX(ex. solaris) and Linux plaforms. First I would like to ask what is the difference between Unix and Linux. And also can please tell me firewalls are available on these platforms? Thank you before hand. (1 Reply)
Discussion started by: chrisd
1 Replies

9. UNIX for Dummies Questions & Answers

unix firewall

our WBM is not working so I cannot enter firewall entries so I would like to know how to do it using unix commands after I have logged in via telnet:wall: (4 Replies)
Discussion started by: kool
4 Replies

10. Shell Programming and Scripting

How can i run sql queries from UNIX shell script and retrieve data into text docs of UNIX?

Please share the doc asap as very urgently required. (1 Reply)
Discussion started by: 24ajay
1 Replies
CHING(6)							 BSD Games Manual							  CHING(6)

NAME
ching -- the book of changes and other cookies SYNOPSIS
ching [hexagram] DESCRIPTION
The I Ching or Book of Changes is an ancient Chinese oracle that has been in use for centuries as a source of wisdom and advice. The text of the oracle (as it is sometimes known) consists of sixty-four hexagrams, each symbolized by a particular arrangement of six straight (---) and broken (- -) lines. These lines have values ranging from six through nine, with the even values indicating the broken lines. Each hexagram consists of two major sections. The Judgement relates specifically to the matter at hand (e.g., ``It furthers one to have somewhere to go.'') while the Image describes the general attributes of the hexagram and how they apply to one's own life (``Thus the superior man makes himself strong and untiring.'') When any of the lines have the values six or nine, they are moving lines; for each there is an appended judgement which becomes significant. Furthermore, the moving lines are inherently unstable and change into their opposites; a second hexagram (and thus an additional judgement) is formed. Normally, one consults the oracle by fixing the desired question firmly in mind and then casting a set of changes (lines) using yarrow-stalks or tossed coins. The resulting hexagram will be the answer to the question. Using an algorithm suggested by S. C. Johnson, the UNIX oracle simply reads a question from the standard input (up to an EOF) and hashes the individual characters in combination with the time of day, process id and any other magic numbers which happen to be lying around the system. The resulting value is used as the seed of a random number generator which drives a simulated coin-toss divination. The answer is then piped through nroff(1) for formatting and will appear on the standard output. For those who wish to remain steadfast in the old traditions, the oracle will also accept the results of a personal divination using, for example, coins. To do this, cast the change and then type the resulting line values as an argument. The impatient modern may prefer to settle for Chinese cookies; try fortune(6). DIAGNOSTICS
The great prince issues commands, Founds states, vests families with fiefs. Inferior people should not be employed. SEE ALSO
It furthers one to see the great man. BUGS
Waiting in the mud Brings about the arrival of the enemy. If one is not extremely careful, Somebody may come up from behind and strike him. Misfortune. BSD
May 31, 1993 BSD
All times are GMT -4. The time now is 10:45 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy