11-24-2008
unix
How to disable the visibility of the password character in the screen
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Okee problems...!!
What is happening: Unix server with some programms, workstations are windows 2000, the workstations work good but when you start a programm on the Unix server the CPU of the workstations go to 100% usage resulting that the system gets very slow. The programm well its running so... (2 Replies)
Discussion started by: zerocool
2 Replies
2. UNIX for Dummies Questions & Answers
I tried looking for the answer online and came up with only a few semi-answers as to why file and directory names are case sensitive in Unix. Right off the bat, I'll say this doesn't bother me. But I run into tons of Windows and OpenVMS admins in my day job who go batty when they have to deal... (3 Replies)
Discussion started by: deckard
3 Replies
3. UNIX for Advanced & Expert Users
hi
i want run an unix application from a windows program/application.i am using SSH(command line version)to log on to a unix machine from windows. the application has to read a configuration file inorder to run. the configuration file .CFG is in bin in my home directory. but the application... (1 Reply)
Discussion started by: megastar
1 Replies
4. Shell Programming and Scripting
Hi,
My local server is :/usr/abcd/
Remote server is :/Usr/host/test/
I want to send files from local unix directory(All files starting with O_999) to
remote host unix directory.
Can any body give me the Unix Shell script to do this.
One more doubt: Shall we need to change the file... (1 Reply)
Discussion started by: raja_1234
1 Replies
5. Shell Programming and Scripting
Hi Experts,
I have a requirement where i need to setup a batch job which runs everymonth and move the pdf files from unix server to windows servers.
Could some body provide the inputs for this.
and also please provide the inputs on how to map the network dirve in the unix like that... (1 Reply)
Discussion started by: ger199901
1 Replies
6. UNIX for Dummies Questions & Answers
How does unix system administration, unix programming, unix network programming differ?
Please help. (0 Replies)
Discussion started by: thulasidharan2k
0 Replies
7. Shell Programming and Scripting
Dear All,
Can someone help to command or program to transfer the file from windows to Unix server and from one unix server to another Unix server in secure way.
I would request no samba client. (4 Replies)
Discussion started by: yadavricky
4 Replies
8. Post Here to Contact Site Administrators and Moderators
We work hard to make The UNIX and Linux Forums one of the best UNIX and Linux knowledge sources on the net. The site is certainly one of the top UNIX and Linux Q&A sites on the web. In order to provide certain members the best quality account services, you can now get some great extra features by... (2 Replies)
Discussion started by: Neo
2 Replies
tkwait(n) Tk Built-In Commands tkwait(n)
__________________________________________________________________________________________________________________________________________________
NAME
tkwait - Wait for variable to change or window to be destroyed
SYNOPSIS
tkwait variable name
tkwait visibility name
tkwait window name
_________________________________________________________________
DESCRIPTION
The tkwait command waits for one of several things to happen, then it returns without taking any other actions. The return value is always
an empty string. If the first argument is variable (or any abbreviation of it) then the second argument is the name of a global variable
and the command waits for that variable to be modified. If the first argument is visibility (or any abbreviation of it) then the second
argument is the name of a window and the tkwait command waits for a change in its visibility state (as indicated by the arrival of a Visi-
bilityNotify event). This form is typically used to wait for a newly-created window to appear on the screen before taking some action. If
the first argument is window (or any abbreviation of it) then the second argument is the name of a window and the tkwait command waits for
that window to be destroyed. This form is typically used to wait for a user to finish interacting with a dialog box before using the
result of that interaction.
While the tkwait command is waiting it processes events in the normal fashion, so the application will continue to respond to user interac-
tions. If an event handler invokes tkwait again, the nested call to tkwait must complete before the outer call can complete.
KEYWORDS
variable, visibility, wait, window
Tk tkwait(n)