Sponsored Content
Full Discussion: configuring network
Operating Systems Solaris configuring network Post 302247537 by Smiling Dragon on Wednesday 15th of October 2008 10:43:50 PM
Old 10-15-2008
You can either switch the files to read-write via chmod (remember to set them back to read-only when you are finished) or edit them in vi and save with the :w! command (the '!' character forces it to override the read-only mode).
 

9 More Discussions You Might Find Interesting

1. IP Networking

configuring the new desktop in the network.

I have a new desktop in my company and I want to configure that box in our network.we using unix sytem.I don,t have enough knowledge about the unix,so please can you suggest me how to configure the desktop.This is urgent if you can help me quickly. (1 Reply)
Discussion started by: bbutani
1 Replies

2. UNIX for Dummies Questions & Answers

configuring network infomation

Hello all, I am trying to hit the internet from my unix box (sun 250e), but cannot reach any external IP addresses. I've updated the hosts and resolv.conf files with what i assume is the right information, but nothing happens (after reboot). In the hosts file, i've entered the Router, PDC,... (4 Replies)
Discussion started by: colesy
4 Replies

3. AIX

Configuring Network Printer in IBM AIX

Hi, We have two IBM pSeires servers running IBM AIX. I want to configure the IBM servers to print on the network printer. Here is the following configuration IBM Server-I IP Add: 192.168.0.5 IBM Server-II IP Add: 192.168.0.6 Network Printer IP Add: 192.168.0.15 I'm new to IBM AIX OS.... (0 Replies)
Discussion started by: berhanemt
0 Replies

4. Ubuntu

Please help me in configuring network in Ubuntu

Hi Friends, I have installed Ubuntu in win xp system with the help of Vmware workstation.Can anyone tell me how to configure network in Ubuntu.I mean how to connect it to Internet. Thanks in advance, Eajaz. (2 Replies)
Discussion started by: ajazshariff
2 Replies

5. UNIX for Dummies Questions & Answers

Configuring a Network Card in SLED 11

I want to connect to the internet via Wi-Fi, but I need to configure my pci adapter card for it to work. The adapter I am using is a Linksys Wireless-G pci adapter wmp54gs.:confused: (5 Replies)
Discussion started by: ryan352333
5 Replies

6. Solaris

Configuring network interfaces in Solaris11

Hi all, Just istalled Solaris 11. Want to configure network interfaces and got some problems: #dladm show-phys # #dladm show-link # If i run ifconfig -a, i am getting 2 lo0 (loopback) interfaces and thats all. I can't enable interface, can't list it, can't assign IP to it. Can... (2 Replies)
Discussion started by: nypreH
2 Replies

7. Red Hat

Network becomes slow and return fast only after restart network

Hi, I have 2 machines in production environment: 1. redhat machine for application 2. DB machine (oracle) The application doing a lot of small read&writes from and to the DB machine. The problem is that after some few hours the network from the application to the DB becomes very slow and... (4 Replies)
Discussion started by: moshesa
4 Replies

8. SuSE

Facing issue configuring network

Please let me know how to configure network in suse Linux, I have configured the network using ifup and network manager, it is not giving any error but not working, using suse Linux 11.0 sp3 I have checked network connectivity is working. (0 Replies)
Discussion started by: manoj.solaris
0 Replies

9. Solaris

Configuring central logging server for network devices

Hi I am very well aware of configuring central logging (syslog)server on solaris to capture logs of other solaris servers. But don't know how to capture the logs of network devices like Juniper , cisco etc on solaris server. Is this possible through syslog server of solaris. Is there any way we... (1 Reply)
Discussion started by: amity
1 Replies
CHMOD(1)						    BSD General Commands Manual 						  CHMOD(1)

NAME
chmod -- change file modes SYNOPSIS
chmod [-R [-H | -L | -P]] [-fh] mode file ... DESCRIPTION
The chmod utility modifies the file mode bits of the listed files as specified by the mode operand. The options are as follows: -H If the -R option is specified, symbolic links on the command line are followed. (Symbolic links encountered in the tree traversal are not followed.) -L If the -R option is specified, all symbolic links are followed. -P If the -R option is specified, no symbolic links are followed. -R Change the modes of the file hierarchies rooted in the files instead of just the files themselves. -f Do not display a diagnostic message or modify the exit status if chmod fails to change the mode of a file. -h If file is symbolic link, the mode of the link is changed. The -H, -L and -P options are ignored unless the -R option is specified. In addition, these options override each other and the command's actions are determined by the last one specified. Only the owner of a file or the super-user is permitted to change the mode of a file. EXIT STATUS
The chmod utility exits 0 on success, and >0 if an error occurs. MODES
Modes may be absolute or symbolic. An absolute mode is an octal number constructed by or'ing the following values: 4000 set-user-ID-on-execution 2000 set-group-ID-on-execution 1000 sticky bit, see chmod(2) 0400 read by owner 0200 write by owner 0100 execute (or search for directories) by owner 0070 read, write, execute/search by group 0007 read, write, execute/search by others The read, write, and execute/search values for group and others are encoded as described for owner. The symbolic mode is described by the following grammar: mode ::= clause [, clause ...] clause ::= [who ...] [action ...] last_action action ::= op [perm ...] last_action ::= op [perm ...] who ::= a | u | g | o op ::= + | - | = perm ::= r | s | t | w | x | X | u | g | o The who symbols ``u'', ``g'', and ``o'' specify the user, group, and other parts of the mode bits, respectively. The who symbol ``a'' is equivalent to ``ugo''. The perm symbols represent the portions of the mode bits as follows: r The read bits. s The set-user-ID-on-execution and set-group-ID-on-execution bits. t The sticky bit. w The write bits. x The execute/search bits. X The execute/search bits if the file is a directory or any of the execute/search bits are set in the original (unmodified) mode. Operations with the perm symbol ``X'' are only meaningful in conjunction with the op symbol ``+'', and are ignored in all other cases. u The user permission bits in the mode of the original file. g The group permission bits in the mode of the original file. o The other permission bits in the mode of the original file. The op symbols represent the operation performed, as follows: + If no value is supplied for perm, the ``+'' operation has no effect. If no value is supplied for who, each permission bit specified in perm, for which the corresponding bit in the file mode creation mask is clear, is set. Otherwise, the mode bits represented by the specified who and perm values are set. - If no value is supplied for perm, the ``-'' operation has no effect. If no value is supplied for who, each permission bit specified in perm, for which the corresponding bit in the file mode creation mask is clear, is cleared. Otherwise, the mode bits represented by the specified who and perm values are cleared. = The mode bits specified by the who value are cleared, or, if no who value is specified, the owner, group and other mode bits are cleared. Then, if no value is supplied for who, each permission bit specified in perm, for which the corresponding bit in the file mode creation mask is clear, is set. Otherwise, the mode bits represented by the specified who and perm values are set. Each clause specifies one or more operations to be performed on the mode bits, and each operation is applied to the mode bits in the order specified. Operations upon the other permissions only (specified by the symbol ``o'' by itself), in combination with the perm symbols ``s'' or ``t'', are ignored. EXAMPLES
644 make a file readable by anyone and writable by the owner only. go-w deny write permission to group and others. =rw,+X set the read and write permissions to the usual defaults, but retain any execute permissions that are currently set. +X make a directory or file searchable/executable by everyone if it is already searchable/executable by anyone. 755 u=rwx,go=rx u=rwx,go=u-w make a file readable/executable by everyone and writable by the owner only. go= clear all mode bits for group and others. g=u-w set the group bits equal to the user bits, but clear the group write bit. SEE ALSO
chflags(1), install(1), chmod(2), stat(2), umask(2), fts(3), setmode(3), symlink(7), chown(8) STANDARDS
The chmod utility is expected to be IEEE Std 1003.2-1992 (``POSIX.2'') compatible with the exception of the perm symbol ``t'' which is not included in that standard. BUGS
There's no perm option for the naughty bits. BSD
January 22, 2010 BSD
All times are GMT -4. The time now is 06:54 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy