10-27-2010
Hi sanjay,
Thank you. Still i have confusion with the above point. If file got modified on oct 15 means, file sholud have accessed (i.e, opened) and then can able to modify the file right.
If so , in my point of view file usage time also should be oct 15 , is it correct? Please correct me if i am wrong
Thanks,
Puni
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All,
I want to ssh to a remote terminal i did the following steps
1. On the client run the following commands:
2. $ mkdir -p $HOME/.ssh
3. $ chmod 0700 $HOME/.ssh
4. $ ssh-keygen -t dsa -f $HOME/.ssh/id_dsa -P ''
and then tried the following
$ ssh -i $HOME/.ssh/id_dsa server
... (1 Reply)
Discussion started by: gauri
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I need to capture output of prstat command for certain pid's .I found it as prstat -j filename. I created a filename projlist gave the pid number on the projlist file and run the cmd like this
>prstat -j projlist
prstat: illegal argument -- projlist
can anybody suggest how to... (1 Reply)
Discussion started by: vipin771
1 Replies
3. HP-UX
how can I find cpu usage memory usage swap usage and
I want to know CPU usage above X% and contiue Y times and memory usage above X % and contiue Y times
my final destination is monitor process
logical volume usage above X % and number of Logical voluage above
can I not to... (3 Replies)
Discussion started by: alert0919
3 Replies
4. Solaris
I know one of the more seasoned veterans probably opened this thread looking for their chance to refer me to the site's search feature and let me tell you.
I'VE LOOKED!!!! And I didn't find anything helpful...
So, I've got a windows background and I'm fond of its search feature which comes... (6 Replies)
Discussion started by: ProGrammar
6 Replies
5. AIX
How to monitor the IBM AIX server for I/O usage, memory usage, CPU usage, network usage, storage usage? (3 Replies)
Discussion started by: laknar
3 Replies
6. UNIX for Advanced & Expert Users
Good day all.
I'm trying to add a user with useradd and the -p option to assign a project name, but the result is that the user is created with an error message: "UX: useradd: user.root name should be all lower case or numeric."
The command:
useradd -d /export/home/tester -g rtpgrp -G... (2 Replies)
Discussion started by: BRH
2 Replies
7. IP Networking
Hi gurus of unix, I haved installed my openSolaris in a HP530,
Recently I use the following command
beadm destry opensolaris1
beadm destry opensolaris2
After That I reboot my Laptop.
Well when I go to my work I try to open my wireshark tool, but the option in GUI interface does not appear!!!... (2 Replies)
Discussion started by: andresguillen
2 Replies
8. Shell Programming and Scripting
Hi,
I am using mailx command in shell script. When i put -c option for CC , i get error message as "Unknown flag: -c" . I checked manual of mailx command and found that ~c to be used but after using ~c also it is not working. My shell is Korn. Kindly let me know what i have to do .
Thanks (9 Replies)
Discussion started by: krishna_gnv
9 Replies
9. Shell Programming and Scripting
Hi,
i am using fgrep command with following syntax
fgrep -v -f pattern_file_name file
file contains few line and have the pattern which i am giving in pattern file.
My Problem is :
its is not giving any output.
while i am using fgrep -f pattern_file_name file
it is showing all... (4 Replies)
Discussion started by: emresearch
4 Replies
10. Shell Programming and Scripting
Hello Guys ,
I am trying to run below in one of my script but unable to get it succeed .
Can anyone help me on this?
I am using HP-UX.
if
then
write_log " Both files are present . Mail will be send to respective teams."
EMAIL_SUBJECT="MGCA - File Extraction Process COMPLETED"... (12 Replies)
Discussion started by: himanshu sood
12 Replies
RUSH(8) Gnurush RUSH(8)
NAME
rush - a restricted user shell
SYNOPSIS
rush [-F STRING] [-f DIR] [-n NUM] [--forward] [-H]
rush {-v | -h | --usage}
DESCRIPTION
GNU rush is a restricted user shell (R-U-SH), designed for sites that provide only limited remote access to their resources. This could be
Subversion or Git repositories, upload sites accessible only by Scp, or similar services.
Using a sophisticated configuration file, GNU rush gives the administrator complete control over the command lines that users are able to
execute, as well as over the access to and usage of system resources. Usually virtual memory, CPU time, etcetera, are determined by this
system wide configuration.
OPTIONS
-c COMMAND
Specify a command to run.
-C TEST | --security-check=TEST
Configure security checks for the main configuration file.
-d NUM | --debug=NUM
Set debugging level.
--show-default
Disply the built-in default configuration.
-t | --test | --lint [FILE]
Run in test mode. The optional argument FILE determines the location of an alternate configuration file to be used. In case also
the option '-c' is specified, then rush will emulate normal processing for the given command, but will not actually execute it.
-u NAME | --user=NAME
Emulate shell access by the user NAME. The option '--test' is implied. The use of this option is allowed only for root and in
conjunction with the further option '-c'.
-v | --version
Display program version.
-h | --help
Display a short help message.
--usage
Display a concise usage summary.
SEE ALSO
The full documentation for GNU Rush is maintained as a Texinfo manual. If the info and rush programs are properly installed at your site,
the command
info rush
should give you access to the complete manual.
See also rushlast(1) and rushwho(1).
AUTHOR
This text was written by Mats Erik Andersson for the Debian project, since the original source supplies a documentation only in the form of
a GNU Texinfo manual.
GNU Rush 1.7 December 2010 RUSH(8)