10-22-2008
Quote:
Originally Posted by
aliahsan81
yes
But in my setup i dont wana break current functionality,Then you know how programmer reacts.So i will be using what i said before
Then please explain why taking files that are not supposed to be executable and making them read only or read-write only will break current functionality?
What you are doing is good, but it is not enough to be fully secure.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi everyone, I'm a newbie at this. We have a unix web server which has redhat 7.2 on it. It has apache server hosting our website at the moment. This is what I'm trying to do.
Goal: I'm trying to put reports online so when clients come they can read it and what not. I want only clients viewing... (2 Replies)
Discussion started by: crazycelicagts
2 Replies
2. Shell Programming and Scripting
Hi ,
I 'm trying to check if multiple directories exist on a server, if not create the missing ones and print " creating missing directory.
how to write this in a simple script, I have made my code complex
if ; then
taskStatus="Schema extract directory exists, checking if SQL,Count and... (7 Replies)
Discussion started by: ramky79
7 Replies
3. Shell Programming and Scripting
Hello all,
Here's the deal...I have one directory with many subdirs and files.
What I want to find out is who is keeping old files and directories...say files and dirs that they didn't use since a number of n days, only one level under the initial dir. Output to a file.
A script for... (5 Replies)
Discussion started by: ejianu
5 Replies
4. Shell Programming and Scripting
Hi ,
I am very new to unix as well as shell scripting. I have to write a script for the following requirement.
In a particular mount, have to list all the directories and sub directories along with size of the directory and sub directory in ascending order.
Please help me in this regard and many... (4 Replies)
Discussion started by: nmakkena
4 Replies
5. UNIX for Dummies Questions & Answers
Hi all,
Using grep command, i want to find the pattern of text in all directories and sub-directories.
e.g: if i want to search for a pattern named "parmeter", i used the command
grep -i "param" ../*
is this correct? (1 Reply)
Discussion started by: vinothrajan55
1 Replies
6. Shell Programming and Scripting
Can anyone come up with a unix command that lists
all the files, directories and sub-directories in the current directory
except a folder called log.?
Thank you in advance. (7 Replies)
Discussion started by: Manjunath B
7 Replies
7. Red Hat
whats the use of this create mask = 0777
wht means mask ? (3 Replies)
Discussion started by: babinlonston
3 Replies
8. UNIX for Dummies Questions & Answers
It is for HP-Unix B.11.31.
Requirement:
1. List the directories, having given pattern in the directories name, sorted by creation date.
Example: Directories with name "pkg32*" or "pkg33*"
2. On the output of 1. list the directories by creation date as sort order, with creation date... (2 Replies)
Discussion started by: Siva SQL
2 Replies
9. Solaris
I have searched this quite a long time but couldn't find the right method for me to use. I need to assign read write permission to the user for specific directories and it's sub directories and files. I do not want to use ACL. This is for Solaris. Please help. (1 Reply)
Discussion started by: blinkingdan
1 Replies
LEARN ABOUT OPENSOLARIS
_end
end(3C) Standard C Library Functions end(3C)
NAME
end, _end, etext, _etext, edata, _edata - last locations in program
SYNOPSIS
extern int _etext;
extern int _edata;
extern int _end;
DESCRIPTION
These names refer neither to routines nor to locations with interesting contents; only their addresses are meaningful.
_etext The address of _etext is the first location after the last read-only loadable segment.
_edata The address of _edata is the first location after the last read-write loadable segement.
_end If the address of _edata is greater than the address of _etext, the address of _end is same as the address of _edata.
If the address of _etext is greater than the address of _edata, the address of _end is set to the page boundary after the address
pointed to by _etext.
USAGE
When execution begins, the program break (the first location beyond the data) coincides with _end, but the program break can be reset by
the brk(2), malloc(3C), and the standard input/output library (see stdio(3C)), functions by the profile (-p) option of cc(1B), and so on.
Thus, the current value of the program break should be determined by sbrk ((char *)0).
References to end, etext, and edata, without a preceding underscore will be aliased to the associated symbol that begins with the under-
score.
SEE ALSO
cc(1B), brk(2), malloc(3C), stdio(3C)
SunOS 5.11 31 Mar 2006 end(3C)