32 bit IP addresses with class based allocation schemes have limitations. does anyone know where i could get some info on this or if you have time to spare and really want to help me, a couple of sentences.
thanks
milos (1 Reply)
Hi All,
I want to sort a flat file which will contain millions of records based on a key/field. For this I want to use unix sort command and before that I want to make sure that unix sort command has any file size limitations. And also please let me know whether I have to change any... (2 Replies)
I am trying to use the csplit file on a file that contains records that have more than 2048 characters on a line. The resultant split file seems to ignore the rest of the line and I lose the data.
Is there any way that csplit can handle record lengths greater than 2048?
Thanks (0 Replies)
I'm running a simulation (programmed in C) which makes calls to gnuplot periodically to plot data I have stored.
First I open a pipe to gnuplot and set it to multiplot:
FILE * pipe = popen("gnuplot", "w");
fprintf(pipe, "set multiplot\n");
fflush(pipe);
(this pipe stays open until the... (0 Replies)
As part of a quiz assigned during my unix class I was asked to write a program to ask for a file name, print read errors, and "reverse elements in a list."
I used the 'tac' command in my solution, however, I was then lectured for 5 min about the "limitations" of the 'tac' command and how a 'for'... (6 Replies)
Hi,
I have noticed some performance issues on my RHEL5 server but the memory and CPU utilization on the box is fine.
I have a 1G full duplexed eth0 card and I am suspicious that this may be causing the problem. My eth0 settings are as follows:
Settings for eth0:
Supported ports: ... (12 Replies)
Hi,
I recently started working with Solaris, and what I noticed is that a lot of commands I used to regularly use don't work, like sed -i and grep -r. I have found work arounds for these problems though but it's a pain in the ass.
I'm just wondering why they decided not to include these handy... (4 Replies)
Guys: I have a customer using the 'pdftotext' utility under Linux. PDFs are received via email, converted to text, etc. and it has worked nicely for years. They received a PDF from a customer and the utility will not read it. The text file is created but it's either empty or has 1-2 bytes of... (23 Replies)
Jifty::Plugin::Authentication::Password::Mixin::Model::UUser3Contributed Perl DocuJifty::Plugin::Authentication::Password::Mixin::Model::User(3pm)NAME
Jifty::Plugin::Authentication::Password::Mixin::Model::User - password plugin user mixin model
SYNOPSIS
package MyApp::Model::User;
use Jifty::DBI::Schema;
use MyApp::Record schema {
# custom column definitions
};
use Jifty::Plugin::User::Mixin::Model::User; # name, email, email_confirmed
use Jifty::Plugin::Authentication::Password::Mixin::Model::User;
# ^^ password, auth_token
DESCRIPTION
This mixin model is added to the application's account model for use with the password authentication plugin. This mixin should be used in
combination with Jifty::Plugin::User::Mixin::Model::User.
SCHEMA
This mixin adds the following columns to the model schema:
auth_token
This is a unique identifier used when confirming a user's email account and recovering a lost password.
password
This is the user's password. It will be stored in the database after being processed through Digest::MD5, so the password cannot be
directly recovered from the database.
METHODS
register_triggers
Adds the triggers to the model this mixin is added to.
password_is PASSWORD
Checks if the user's password matches the provided PASSWORD.
hashed_password_is HASH TOKEN
Check if the given HASH is the result of hashing our (already salted and hashed) password with TOKEN.
This can be used in cases where the pre-hashed password is sent during login as an additional security precaution (such as could be done
via Javascript).
validate_password
Makes sure that the password is six characters long or longer, unless we have alternative means to authenticate.
after_create
This trigger is added to the account model. It automatically sends a notification email to the user for password confirmation.
See Jifty::Plugin::Authentication::Password::Notification::ConfirmEmail.
has_alternative_auth
If your model supports other means of authentication, you should have this method return true, so the "password" field can optionally be
null and authentication with password is disabled in that case.
after_set_password
Regenerate authentication tokens on password change
regenerate_auth_token
Generate a new auth_token for this user. This will invalidate any existing feed URLs.
SEE ALSO
Jifty::Plugin::Authentication::Password, Jifty::Plugin::User::Mixin::Model
LICENSE
Jifty is Copyright 2005-2010 Best Practical Solutions, LLC. Jifty is distributed under the same terms as Perl itself.
perl v5.14.2 2010-12-10 Jifty::Plugin::Authentication::Password::Mixin::Model::User(3pm)