Can anybody tell me how can I create an account without having to enter the password after editing the vipw file. I mean the system should automatically take care of the password encryption in the shadow file and I don't to enter the password again and the Account should be ready to go.
... (3 Replies)
hi.
i´m working in bash and am trying to create a Perl daemon that controls bash´s behavior. this is actually in preparation for a later project i´ll be working on.
basically, i´m looking for a way to have the Perl daemon tell bash what to do. i already have a small daemon that simply prints... (2 Replies)
hi there, i need help :( im trying to produce a program that would do the following, but i dont know were to begin, any help/guide lines, please im need help asap,
One program is the main program, which fork/execs one referee process and
three x,y,z processes repectvley. It then waits until... (0 Replies)
Hi All,
I am the new boy on the Block with HP-UX.
To get to the point, I have a Hp-ux (C200) workstation running on Hp-ux 11.x Operating System. A week ago when practicing on file access permission, I have set the permission on a directory (perhaps a file I am not sure) to 0544 and did... (19 Replies)
in a ksh script, i want to process
some string variables using awk,
and then i want to go on using this variables
in the same ksh (out of awk lines)
can anybody send me a very simple example about this? (0 Replies)
Hi all,
I am struck at this point and needed some help in ruby
I wanted to write a script that accepts the no of VNICs the user wants to create and
then ask for the name of each Vnic he wants
then use these names to create the corresponding Vnics
Eg: suppose that there are 2 Vnics to be... (0 Replies)
I'm wanting to get user interaction...textbox or checkboxes would be great. I want to allow someone to enter data into textbox. (this is the time I want to grab a photo from) Then I want to be able to check the different sizes I want for the image. Say 4 options.
Is this possible using the... (0 Replies)
Hi All, I have been trying to get an Expect program to communicate with a Remote Power Switch which will eventually log in, and then turn on/off certain outlets. For some reason, I can't get through the log in procedure with this Switch. When you first spawn the telnet, you get the Switch... (1 Reply)
If I use to PAM to validate a vsftp user using a remote service to do the validation and the user does not exist on the system locally, then what becomes the home directory for the user logging in via vsftp?
Assuming that chroot_user_list is enable to limit all users to their home directory. (0 Replies)
Sorry for my english!
I'm using Debian squeeze and for an assignement, i have create 2 virtual pdf cups printers. Both are working very well.
To test the different administion command; i try to disable one of the printer and move his queue file to the second one. I'm able to do it easily.
... (4 Replies)
Discussion started by: lyapma
4 Replies
LEARN ABOUT REDHAT
symlinks
SYMLINKS(8) System Manager's Manual SYMLINKS(8)NAME
symlinks - symbolic link maintenance utility
SYNOPSIS
symlinks [ -cdrstv ] dirlist
DESCRIPTION
symlinks is a useful utility for maintainers of FTP sites, CDROMs, and Linux software distributions. It scans directories for symbolic
links and lists them on stdout, often revealing flaws in the filesystem tree.
Each link is output with a classification of relative, absolute, dangling, messy, lengthy, or other_fs.
relative links are those expressed as paths relative to the directory in which the links reside, usually independent of the mount point of
the filesystem.
absolute links are those given as an absolute path from the root directory as indicated by a leading slash (/).
dangling links are those for which the target of the link does not currently exist. This commonly occurs for absolute links when a
filesystem is mounted at other than its customary mount point (such as when the normal root filesystem is mounted at /mnt after booting
from alternative media).
messy links are links which contain unnecessary slashes or dots in the path. These are cleaned up as well when -c is specified.
lengthy links are links which use "../" more than necessary in the path (eg. /bin/vi -> ../bin/vim) These are only detected when -s is
specified, and are only cleaned up when -c is also specified.
other_fs are those links whose target currently resides on a different filesystem from where symlinks was run (most useful with -r ).
OPTIONS -c convert absolute links (within the same filesystem) to relative links. This permits links to maintain their validity regardless of
the mount point used for the filesystem -- a desirable setup in most cases. This option also causes any messy links to be cleaned
up, and, if -s was also specified, then lengthy links are also shortened. Links affected by -c are prefixed with changed in the
output.
-d causes dangling links to be removed.
-r recursively operate on subdirectories within the same filesystem.
-s causes lengthy links to be detected.
-t is used to test for what symlinks would do if -c were specified, but without really changing anything.
-v show all symbolic links. By default, relative links are not shown unless -v is specified.
BUGS
symlinks does not recurse or change links across filesystems.
AUTHOR
symlinks has been written by Mark Lord <mlord@bnr.ca>, the developer and maintainer of the IDE Performance Package for linux.
SEE ALSO symlink(2)Version 1.2 November 1994 SYMLINKS(8)