10-10-2008
opening a new threat was a mistake I am sorry about that. My browser had an issue. I think I posted that to the other thread.
And Yes I am still looking for solutions.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello guys !
I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course.
Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan.
But when... (3 Replies)
Discussion started by: abidmalik
3 Replies
2. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
3. Cybersecurity
Hi All,
I am new to the concept of encryption and shell and i have been assigned to do pgp encryption of a file before ftping it.
I am developing the script using MKS Toolkit on Windows XP and the script will run later on actual unix box.
I am going through documents provided by pgp... (2 Replies)
Discussion started by: sandeepb
2 Replies
4. AIX
Hi
All,
I have a AIX 5.3. does anybody know how to encrypt a text file?
Thanks,
Vishal (4 Replies)
Discussion started by: vishalpatel03
4 Replies
5. UNIX for Dummies Questions & Answers
Dear Members,
Can we find if a particular file is encrypted or decrypted.
I need a command by which i should be able to identify if a file is encrypted or decrypted.
How can we do this? (1 Reply)
Discussion started by: sandeep_1105
1 Replies
6. Solaris
Hi, does anybody know of any tool that would allow me to have all files store in a folder automatically encrypted? or some similar capability? (2 Replies)
Discussion started by: malky
2 Replies
7. Red Hat
Hello!
I want to know about file encryption in redhat linux.... Please suggest me some gud websites from where i can get detailed information...
Thanks in advance.... (3 Replies)
Discussion started by: aliyaa
3 Replies
8. Shell Programming and Scripting
Folks,
Is there anyone to help on GPG file encryptions here.
I got a public key from third party. I imported the key in server.
I want to encrypt the public key. But without being signed , the key cannot be encrypted.
When I try to sign the key using lsign command,
I am getting the below... (1 Reply)
Discussion started by: dinesh1985
1 Replies
9. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
LEARN ABOUT HPUX
pw_getukid
postwait(2) System Calls Manual postwait(2)
NAME
postwait: pw_getukid(), pw_wait(), pw_post(), pw_postv(), pw_getvmax() - lightweight synchronization mechanism
SYNOPSIS
DESCRIPTION
Postwait is a fast, lightweight sleep/wakeup mechanism that can be used for synchronization by cooperating kernel threads within a single
process or between separate processes.
A thread calls to block. It resumes execution when it is posted by another thread, the call expires, or is signaled. If one or more posts
are already pending, returns immediately.
Threads using postwait are identified by their ukid. A thread retrieves its ukid by calling It shares this ukid with anyone it chooses by
any means it considers appropriate (for example, shared memory).
is called with a timeout ts. If ts is NULL, the thread will not timeout. It will remain blocked until posted or a signal wakes it up.
If ts points to a zero-valued timespec, will return immediately with a value (and indicating whether or not it was posted.
If ts points to a timespec whose value is greater than zero, the thread will block for that amount of time unless it is posted or inter-
rupted by a signal, in which case the timespec pointed to by ts is updated with the remaining time. The return value and are set to indi-
cate the reason the call returned.
is used to post many threads with a single call. It posts to all threads in the targets array. An value for each target is returned in
the errors array. (0 indicates success.) If the errors pointer is zero, no target-specific errors are copied out.
There is a maximum number of threads that can be posted with a single call. This value is returned by
Posts sent to a kernel thread that already has a post pending against it are discarded.
RETURN VALUE
returns 0 if it succeeds, -1 otherwise.
returns 0 if posted, -1 otherwise.
returns 0 if the post succeeds, -1 otherwise.
returns 0 if every post succeeds, -1 otherwise.
returns the maximum number of kernel threads that can be posted with a single call to
ERRORS
sets to one of the following values if it fails:
ukid points to an illegal address. The reliable detection of this error is implementation dependent.
sets to one of the following values if it fails:
was called with a timeout of 0 but the caller has no post(s) pending.
was called with a timeout that expired.
ts points to an illegal address. The reliable detection of this error is implementation dependent.
was interrupted
by a signal.
The timespec pointed to by ts is invalid.
sets to one of the following values if it fails:
The ukid refers to a non-existent kernel thread.
sets to one of the following values if it fails:
targets points to an illegal address. The reliable detection of this error is implementation dependent.
errors points to an illegal address. The reliable detection of this error is implementation dependent.
count is less than 0.
count exceeds the maximum value (as returned by
A ukid refers to a non-existent kernel thread.
postwait(2)