12-14-2008
Quote:
Originally Posted by
incredible
ce - copper ethernet
ce stands for "cassini ethernet"!
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Heythere,
I am currently learning SHELL PROGRAMMING and I have been set this
basic task: To identify who I am and 'output' it ten times.
Now I know that the 'WHO AM I' command identifies who I am but I just
cannot find how to reproduce it ten times. I've tried using 'echo'
(i.e.:
while... (1 Reply)
Discussion started by: peterms
1 Replies
2. UNIX for Dummies Questions & Answers
I have some basic doubts. Can someone clarify in this forum?
1)if
then
eval ' tset -s -Q -m ':?hp' '
else
eval ' tset -s -Q '
what does it exactly mean in .profile?
2) what are 'nobody' and 'noaccess' usernames in /etc/passwd file.
... (3 Replies)
Discussion started by: asutoshch
3 Replies
3. UNIX for Dummies Questions & Answers
is there any reason why a user would want to create an empty file in Unix? (5 Replies)
Discussion started by: wmosley2
5 Replies
4. UNIX for Dummies Questions & Answers
hey...when i type who...what does "pts" field mean???
eg pts 0 etc (1 Reply)
Discussion started by: urwannabefriend
1 Replies
5. IP Networking
With not knowing absolute nothing about Unix can anyone let me in on how it is setup and how easy is it to learn?I'm using MML Commands and know that it is completely different but if I start learning commands in UNIX is that a good way to get started? (1 Reply)
Discussion started by: RoliOCon
1 Replies
6. UNIX for Dummies Questions & Answers
How to know if my AIX 5.2 is running at 64bits?
THANKS (5 Replies)
Discussion started by: GermanSkull
5 Replies
7. UNIX for Dummies Questions & Answers
Hello all. Let me start off by saying I know a little more then it seems by me asking this question... here goes
I have an old 486 box and I want to start messing around with unix. I've been taking classes for 3 or 4 years in c programming in unix, so I am used to the commands and such, but I... (1 Reply)
Discussion started by: robherms
1 Replies
8. HP-UX
Could someone tell me the command to find out the OS version which will give 12 character not the 9 characters(which is usually machine id).
uname -i gives machine id and uname -a is more comprehensive way to look.
Thanks! (4 Replies)
Discussion started by: catwomen
4 Replies
9. Shell Programming and Scripting
hi,
I have a basic question,,
i am in a directory called
/intas/OCU_3.9.1/sbin
ocuut1@france>mv itsa_tcs itsa_tcs_old
mv: itsa_tcs_old: rename: Permission denied
i am logging as the owner of the file.
when i am doing this i am getting the above error of permission denied.
I know... (3 Replies)
Discussion started by: namishtiwari
3 Replies
10. Shell Programming and Scripting
i'm doing this in one terminal:
nc -lu 7402
and it appears to start listening properly, then in another i do this:
echo "hello" | nc -u localhost 7402
and nothing happens on the listening terminal - what am i doing wrong?
thanks. (7 Replies)
Discussion started by: peterworth
7 Replies
LEARN ABOUT HPUX
securenets
securenets(4) Kernel Interfaces Manual securenets(4)
NAME
securenets - NIS map security file
DESCRIPTION
The file defines networks and hosts that can access the NIS maps on a server. Each line in the file gives a network mask and a net
address. For example:
The format of the file is as follows:
o Lines beginning with the character are treated as comments.
o Lines that are not comment lines contain two fields separated by white space. The first field is a netmask, and the second field is a
network.
o The netmask field can be one of the following:
o 255.255.255.255 (IPv4)
o ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (IPv6)
o the string indicating that the second field is a specific host to be allowed access.
The file can have any number of netmask/net pairs.
When is started on the server, it checks for the existence of and reads its contents into memory if it exists. must be stopped and
restarted for any changes in to take effect.
Upon startup, the netmask and the net address are converted to binary format and logical ANDed. The result must equal the net address (the
second address) to be legal.
If the netmask is 255.255.255.255 (all 1's in binary), any address in the net address argument will match it. If any field in the netmask
is 0, the corresponding field in the net address must be 0. When used in this way, the portion of the addresses given as 0 acts as a wild
card.
When a client attempts to bind to the server, checks the client's IP against those given in the file. Again, the address is converted to
binary and logical ANDed with the netmask. The result must equal the net address given in the file. If the client address does not match
any pairs in the file, the binding is refused with the message, "no such map in server's NIS domain".
The file can be used to limit access to specific hosts or to subnets using the wildcard capability.
If there are syntax errors in the file, messages are logged to the logging file (default and is not started.
If a host has multiple interfaces, each interface address must be allowed in the securenets file for that host to have reliable NIS access.
EXAMPLES
The following examples show entries for the file.
Either of the following entries provides access only to the host with address 192.33.33.33:
or
The following entry allows access by any host on the 192.33.33 subnet:
For broader access, such as an entire enterprise, the following entry allows any host whose address begins with "15" to be served:
Either of the following entries allows access for an individual IPv6 address:
or
The following entry allows access for all IPv6 addresses starting with "fec0":
SEE ALSO
ypserv(1M).
securenets(4)