07-14-2006
Guys... thanks...
Not a problem anymore... changing OS... muahahahaha
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
hi guys
Well, i need to have a report generation script or any script which will show me all the content/information of a file when i run that script.
Please help me on this isssue at the earliest.As i am little bit aware of scripting.Thanks in advance!
regards
ash (4 Replies)
Discussion started by: whizkidash
4 Replies
2. Shell Programming and Scripting
hi all,
please tell me clearly the difference between
exit 1 and exit 2
one more question
i want to know the difference between some basic shells like bsh, csh, ksh, bash.
i refered in net i get wast of text pages can any one give me any link to show the diff precisely or any blogs.... (2 Replies)
Discussion started by: Arunprasad
2 Replies
3. Homework & Coursework Questions
Any help on like where to get started on this? I'm just confused.
1. The problem statement, all variables and given/known data:
Enter text here.Queries to satisfy these two report requests (use your CCI database):
Retrieve all rows of active inventory where current on hands is less than... (0 Replies)
Discussion started by: lakers34kb
0 Replies
4. Programming
can these 3 be combined into 1 query?
createtablea1as
selecta.tps_Res_nb,
b.tkt_prod_cd,
b.tkt_prod_typ_nm,
b.prod_intrnl_ds,
b.tkt_prod_typ_nm AS TKT_ENTL_NM,
casewhen b.tkt_prod_nm isnotnullthen b.tkt_prod_nm
when b.tkt_prod_nm isnulland b.prod_intrnl_ds isnotnullthen... (1 Reply)
Discussion started by: dwr80
1 Replies
5. UNIX for Advanced & Expert Users
Is there any way to see how many queries come into our external DNS server? In looking at DNS providers, most of them base pricing on number of queries per month so I just wanted to see if you had any idea/way of gathering that data? A rough ballpark figure would even work.
Our DNS server is... (1 Reply)
Discussion started by: raggmopp
1 Replies
6. Shell Programming and Scripting
Hi Expert,
How to schedule a job on last day of the month.
Need your kind help.
Regards,
PK (3 Replies)
Discussion started by: pkrabi78
3 Replies
7. UNIX for Dummies Questions & Answers
Hi,
1) How to get exact permissions, group names for files while transferring with FTP
2) Is there any command to transfer entire directory and sub directories.
Thanks (1 Reply)
Discussion started by: nag_sathi
1 Replies
8. Red Hat
Hi,
I would like to know on one server how many mouting can be done? wheather there is limitation on number of mounting?
wheather it is possible to increase NFS Performance? if yes then which parameters needs to given while mounting? (3 Replies)
Discussion started by: manoj.solaris
3 Replies
9. IP Networking
Hey everyone,
I have a question, I've been playing around with tcpdump, and noticed my machine making numerous rdns look ups. They are displayed like:
10.80.80.141.51234 > 10.80.80.1.domain: 9950+ PTR? 223.114.55.65.in-addr.arpa. (44)
My question is, if dns works based on numerical... (0 Replies)
Discussion started by: Lost in Cyberia
0 Replies
LEARN ABOUT NETBSD
secmodel_extensions
SECMODEL_EXTENSIONS(9) BSD Kernel Developer's Manual SECMODEL_EXTENSIONS(9)
NAME
secmodel_extensions -- Extensions security model
DESCRIPTION
secmodel_extensions implements extensions to the traditional security model based on the original 4.4BSD. They can be used to grant addi-
tional privileges to ordinary users, or enable specific security measures like curtain mode.
The extensions are described below.
Curtain mode
When enabled, all returned objects will be filtered according to the user-id requesting information about them, preventing users from access-
ing objects they do not own.
It affects the output of many commands, including fstat(1), netstat(1), ps(1), sockstat(1), and w(1).
This extension is enabled by setting security.models.extensions.curtain or security.curtain sysctl(7) to a non-zero value.
It can be enabled at any time, but cannot be disabled anymore when the securelevel of the system is above 0.
Non-superuser mounts
When enabled, it allows file-systems to be mounted by an ordinary user who owns the point node and has at least read access to the special
device mount(8) arguments. Note that the nosuid and nodev flags must be given for non-superuser mounts.
This extension is enabled by setting security.models.extensions.usermount or vfs.generic.usermount sysctl(7) to a non-zero value.
It can be disabled at any time, but cannot be enabled anymore when the securelevel of the system is above 0.
Non-superuser control of CPU sets
When enabled, an ordinary user is allowed to control the CPU affinity(3) of the processes and threads he owns.
This extension is enabled by setting security.models.extensions.user_set_cpu_affinity sysctl(7) to a non-zero value.
It can be disabled at any time, but cannot be enabled anymore when the securelevel of the system is above 0.
SEE ALSO
affinity(3), sched(3), sysctl(7), kauth(9), secmodel(9), secmodel_bsd44(9), secmodel_securelevel(9), secmodel_suser(9)
AUTHORS
Elad Efrat <elad@NetBSD.org>
BSD
December 3, 2011 BSD