03-01-2007
10 More Discussions You Might Find Interesting
1. UNIX Desktop Questions & Answers
ehe may i know what are the difference between Unix & Linux, and what are the advantages of having Unix as well as disadvantages of having Unix or if u dun mind i am dumb do pls tell me what are the advantages as well as the disadvantages of having linux as well. thanks (1 Reply)
Discussion started by: cybertechmkteo
1 Replies
2. Shell Programming and Scripting
For executing a shell script, i know 2 ways:
1) using sh command
2) making the script file executable & then use ./
But i can across another way for executing the scripts... using ". ./"
I tried this way.. but i was able to understand the difference between "./" and ". ./"
I would be very... (2 Replies)
Discussion started by: abishekmag
2 Replies
3. UNIX for Advanced & Expert Users
Hi,
what is the difference btwn s and S in setuid , access permissions.
I have to make to change the access permissions of a file to rwsr_xr_r
but if i type in 4655 it changes the file to rwSr_xr_r .
How can I make this change ?
Please suggest. (2 Replies)
Discussion started by: astha rais
2 Replies
4. Solaris
what is the difference b/w sol9 and sol10 booting procedure?? Recently faced this question with HP...
Thiru (2 Replies)
Discussion started by: tirupathiraju_t
2 Replies
5. Shell Programming and Scripting
Hi, I hope the title does not scare people to look into this thread but it describes roughly what I'm trying to do. I need a solution in PHP.
I'm a programming beginner, so it might be that the approach to solve this, might be easier to solve with an other approach of someone else, so if you... (0 Replies)
Discussion started by: lowmaster
0 Replies
6. Shell Programming and Scripting
Hello All,
I was having a look on threads on the Forum about time calculation but didn't find exactly this issue.
For instance, if we have these 2 dates, begin & end :
20100430235830
20100501000200
Is there anyway, awk, ksh, perl to calculate the difference in sec and get for... (6 Replies)
Discussion started by: rany1
6 Replies
7. Shell Programming and Scripting
Hello All
I have a xml file with many sets of records
like this
<mytag>mydata</mytag>
<tag2>data&</tag2>
also same file can be like this
<mytag>mydata</mytag>
<tag2>data&</tag2>
<tag3>data2&data3</tag3>
Now i can grep & and replace with & for whole file but it will replace all... (4 Replies)
Discussion started by: lokaish23
4 Replies
8. Shell Programming and Scripting
Hi, I have text file abc.txt. In this file, I have the following data.
Input:
Mr Smith & Mrs Smith
Mr Smith &apos Mrs Smith
Mr Smith & Mrs Smith
Mr Smith& Mrs Smith
Mr Smith &Mrs Smith
Output:
Mr Smith & Mrs Smith
Mr Smith &apos Mrs Smith
Mr Smith & Mrs Smith
Mr Smith&... (4 Replies)
Discussion started by: naveed
4 Replies
9. UNIX for Dummies Questions & Answers
Hi All,
Can anyone please help me understanding what the difference between the below two?
1. script.sh &
2. nohup script.sh & (2 Replies)
Discussion started by: Anupam_Halder
2 Replies
10. Shell Programming and Scripting
Hi All,
Do you have any sample script,
- auto get file from SFTP remote server and delete file in remove server after downloaded.
- only download specify filename
- auto upload file from local to SFTP remote server and delete local folder file after uploaded
- only upload specify filename
... (3 Replies)
Discussion started by: weesiong
3 Replies
LEARN ABOUT NETBSD
veriexecctl
VERIEXECCTL(8) BSD System Manager's Manual VERIEXECCTL(8)
NAME
veriexecctl -- manage the Veriexec subsystem
SYNOPSIS
veriexecctl [-ekv] load [file]
veriexecctl delete file | mount_point
veriexecctl dump
veriexecctl flush
veriexecctl query file
DESCRIPTION
The veriexecctl command is used to manipulate Veriexec, the NetBSD file integrity subsystem.
Commands
load [file]
Load the fingerprint entries contained in file, if specified, or the default signatures file otherwise.
This operation is only allowed in learning mode (strict level zero).
The following flags are allowed with this command:
-e Evaluate fingerprint on load, as opposed to when the file is accessed.
-k Keep the filenames in the entry for more accurate logging.
-v Enable verbose output.
delete file | mount_point
Delete either a single entry file or all entries on mount_point from being monitored by Veriexec.
dump Dump the Veriexec database from the kernel. Only entries that have the filename will be presented.
This can be used to recover a lost database:
# veriexecctl dump > /etc/signatures
flush
Delete all entries in the Veriexec database.
query file
Query Veriexec for information associated with file: Filename, mount, fingerprint, fingerprint algorithm, evaluation status, and entry
type.
FILES
/dev/veriexec Veriexec pseudo-device
/etc/signatures default signatures file
SEE ALSO
veriexec(4), veriexec(5), security(7), veriexec(8), veriexecgen(8)
HISTORY
veriexecctl first appeared in NetBSD 2.0.
AUTHORS
Brett Lymn <blymn@NetBSD.org>
Elad Efrat <elad@NetBSD.org>
NOTES
The kernel is expected to have the ``veriexec'' pseudo-device.
BSD
August 31, 2008 BSD