I have just found out that a project I have developed in ASP (ultradev) needs to be migrated to a unix server and won't be able to support asp. Can anyone point me in the right direction to see what my options are with Unix? I have never worked with or developed for a Unix box before.
Also,... (3 Replies)
Hi,
I need to develop timeout functionality in my code, which is not affected by system's time changes.Unfortunately I dont have CLOCK_MONOTONIC support in my OS.
Are there any alternatives? (3 Replies)
Hi folks,
Any folk has experience on ntop/Nmon
ntop - network top
and its spinoff NMON
Welcome to nmon.net
Nmon
Nmon - Wikipedia, the free encyclopedia
nmon for AIX and Linux Performance Monitoring
IBM Wikis - AIX 5L Wiki - nmon
A free tool to analyze AIX and Linux... (5 Replies)
Hi,
I am using rsync to copy files and links from one server to other (backup server).
The problem with rsync is that it is not copying the files and links in the order which i have mentioned.
It is sorting in alphabetical order before it is copying the files and links.
I want a utilty that... (1 Reply)
I am writing a BASH script to update a webserver and then restart Apache. It looks basically like this:
#!/bin/bash
rsync /path/on/local/machine/ foo.com:path/on/remote/machine/
ssh foo.com sudo /etc/init.d/apache2 reloadrsync and ssh don't prompt for a password, because I have DSA encryption... (9 Replies)
I have a list of items (control file) that I want to substitute in a text file, and it's BIG.
The file has two items, the original, and the new:
A B
B C
D E
The file has something like 10,000 entries.
So in the oldfile.txt, I'd like to basically make all these expression matched... (9 Replies)
Hi,
I am using SSH to execute unix commands on remote machines. But, SSH will be diabled soon and I am looking for other alternatives to execute remote scripts/commands, without SSH . any suggestions or workarounds with out SSH for remote program executions ?
Thanks in advance. (4 Replies)
Hi is there an alternative other than the find command to get the size of files which are 10 days older ? I already use a script with find command
find . -mtime +10.
However would want to have an alternative script to find the size of files which are over 10 days.
Let me know if you... (1 Reply)
I'm adapting a BASH script to run with an absolute minimal amounts of Cygwin64 files so colleagues using Windows can use it without installing Cygwin.
I am down to the following in /bin only (replacing cut with parameter substitution eliminated all needed things in /etc)
bash.exe
cygattr-1.dll... (5 Replies)
Discussion started by: Michael Stora
5 Replies
LEARN ABOUT DEBIAN
secvpn
SECVPN(1) General Commands Manual SECVPN(1)NAME
secvpn - Control the Secure Virtual Private Network
SYNOPSIS
secvpn [-v][-n][-s][-r] start|stop|routedel|routeadd|test|status [Host]
DESCRIPTION
Secvpn builds a virtual private network (vpn) as defined in /etc/network/secvpn.conf. The vpn uses encryption based on ssh security.
Before secvpn can be used you have to create some prerequisites. See PREREQUISITES below.
The following subcommands may be used with secvpn:
start is used to start the vpn. Secvpn will add new ppp interfaces necessary to make the vpn work, but will not automatically add routes
(see the routeadd option below). If the recursive option is set, secvpn will log into the passive hosts and run "secvpn -r start" on
them too.
stop is used to stop the vpn.
routeadd
is used to setup new routing entries based on secvpn.conf. Secvpn will first add the route active->passive, then tell the passive
host to add the route back. The route in the passive host will be added according to the configuration file there (in the passive
host), so if the configuration files differ, things will not work.
routedel
will delete the routing entries built with routeadd.
test checks whether the ppp interface is used to reach O_CRYPT_IP.
status same as test, but checks all vpns if no host is named (instead of only active vpns as 'test' does).
OPTIONS -v verbose output
-n do nothing
-s be silent
-r work recursive
PREREQUISITES
Before secvpn can be used you have to enable passwordless ssh access for user "secvpn" from the initiator secvpn pc to the target secvpn
pc. Use authorized_ keys or RhostsRSAAuthentication with the .shosts file. Have a look to the ssh - manpages for more information.
Before secvpn can be used you have to give root rights for specific commands to the user "secvpn". This can be done with the followin com-
mand:
echo "secvpn ALL=NOPASSWD: /usr/sbin/secvpn, /usr/sbin/pppd" >>/etc/sudoers
Before secvpn can be used you have to edit /etc/secvon.conf. See secvpn.conf(4).
EXAMPLES
There are 3 examples in /usr/share/doc/secvpn/examples:
Example1: secvpn acts as router connection 2 subnets
Example2: secvpn having one lan-card and connect 2 subnets
Example3: secvpn having one lan-card and connect 11 subnets in a tree structure
OTHER
To have real security it is necessary to secure each secvpn host and to have firewalls on each secvpn host allowing only selected IP-
Adresses and Ports to pass through the VPN.
AUTHOR
Bernd Schumacher, HP Consulting, HEWLETT-PACKARD GmbH, Bad Homburg, 2000-2005
COPYRIGHT
Copyright: Most recent version of the GPL.
On Debian GNU/Linux systems, the complete text of the GNU General Public License can be found in "/usr/share/common-licenses/GPL".
SEE ALSO secvpn(1)secvpnmon(1)ssh(1)timeout(1)secvpn.conf(4)secvpn August 2000 SECVPN(1)