08-30-2008
How to change ident in ircII
In ircII, how do I change the username and real name that shows up in the /whois ?
10 More Discussions You Might Find Interesting
1. Programming
what is the usage of #ident
I found the following statemant in begining of the shell scirpt ...
#ident "@(#) get.sh 6.12.1 09/30/97"
and I found the following statement in C file
#ident "@(#) getinp.h 5.1.2.1 07/11/97"
Thanks
Sarwan (1 Reply)
Discussion started by: sarwan
1 Replies
2. Programming
Hi,
In my application I have some number c files. In each of the file the following line will be the first statement.
#ident "@(#) set.c 14.1.2.2 05/15/01 17:06:32"
I would like to know what is the use of the above statement.
Thanks
Sarwan (1 Reply)
Discussion started by: sarwan
1 Replies
3. AIX
I have an application which was originally compiled for AIX 4.3.3 which I am trying to compile with xlc 8 on aix 5.2. This app defines a macro called IDENT. Unfortunately, /usr/include/curses.h checks if IDENT is defined and if so, then defines #ident. Since #ident is apparently not supported by... (2 Replies)
Discussion started by: erick00
2 Replies
4. UNIX for Dummies Questions & Answers
Well, I can't figure this out, so I thought it couldn't hurt to ask around anywhere I could...
So I have ircII-2.8.2 (yea, it's old but I have a few psychological issues and one of them prevents me from wanting to change IRC clients) and I'm trying to load scripts via the /load command, as well... (1 Reply)
Discussion started by: guitarscn
1 Replies
5. UNIX for Dummies Questions & Answers
Hi All,
I have a problem sending mail to a host which seems to have sendmail configured to use Ident port (113) to check back on the mail sender.
My problem is that this port is not enabled on the firewalls between sender and receiver so the ident checking and hence the mail is failing and... (0 Replies)
Discussion started by: Jublio
0 Replies
6. UNIX for Dummies Questions & Answers
Okay so I have an alias that looks like this:
ALIAS gscn {
MSG gscn Test1
MSG gscn Test2
MSG gscn Test3
MSG gscn Test4
MSG gscn Test5
}
How do I make it wait 5 seconds between each command before it executes the next one after that in order from top to bottom? I tried the TIMER... (1 Reply)
Discussion started by: guitarscn
1 Replies
7. Shell Programming and Scripting
Hi, I am creating a ksh script to search for a string of text inside files within a directory tree. Some of these file are going to be read/execute only. I know to use chmod to change the permissions of the file, but I want to preserve the original permissions after writing to the file. How can I... (3 Replies)
Discussion started by: right_coaster
3 Replies
8. Shell Programming and Scripting
I have 100 files in a directory , all the files have a word "error" and they are created in different date . Now I would like to change the word from "error" to "warning" , and keep the date of the files ( that means do not change the file creation date after change the word ) , can advise what can... (0 Replies)
Discussion started by: ust3
0 Replies
9. Shell Programming and Scripting
I have 100 files in a directory , all the files have a word "error" and they are created in different date . Now I would like to change the word from "error" to "warning" , and keep the date of the files ( that means do not change the file creation date after change the word ) , can advise what can... (7 Replies)
Discussion started by: ust3
7 Replies
10. SCO
Hello
I'm trying to virtualize an instance of Sco Unix 5.0.5 in VirtualBox (called VM-A) , but sco I have problems set to launch with the new raid controller .
The physical machine has a raid controller adaptec (alad driver) but VirtualBox uses buslogic (blc driver)
What ... (3 Replies)
Discussion started by: flako
3 Replies
LEARN ABOUT CENTOS
in.authd
IN.AUTHD(1) User Commands IN.AUTHD(1)
NAME
in.authd - manual page for in.authd authd-1.4.3:
DESCRIPTION
in.authd [options]... [request]...
-d Output debug messages
-E[cipher]
Encrypt username using [AES-128-CBC]
-e Send UNKNOWN-ERROR for common error messages
-l[mask]
Log to syslog, [mask] for priority levels
-m[reps]
Allow at most [unlimited] requests/connection
-N[basename]
Hide users with ~/[.noident] file
-n Send uid number instead of username
-o Send OTHER instead of the operating system
-t[secs]
Timeout request after [60] seconds
-V Print program and version information
--abrupt
Disconnect without displaying error msgs
--codeset=rfc1340
Send [charset] if reply is not ASCII
--fn[=fields]
Use [all] gecos fields instead of username
--hybrid
Use hybrid notation (ex. ::127.0.0.1) for IPv6
--ident[=basename]
Hide users with no ~/[.ident]
--lang=lc
Localize messages, charsets, & time to [locale]
--mapped=ipv6
Map addresses with same top 96 bits to IPv4
--os[=rfc1340]
Use [uname], not UNIX, as OS name
--passwd=pathname
Use line 1 of [/etc/ident.key] for crypto
--resolve
Use host and service names if available
--username[=login]
Use [nobody] as username
--verbose
Add real uid, addresses/ports, & timestamps
--xerror
Send more helpful error messages for rare errors
$Revision: 1.18 $ $Date: 2004/07/28 16:04:05 $ http://bugzilla.redhat.com/
in.authd authd-1.4.3: June 2014 IN.AUTHD(1)