11-17-2010
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
If not, where did the name come from? (6 Replies)
Discussion started by: pudad
6 Replies
2. UNIX for Dummies Questions & Answers
Dear All
I am curious to know, that in a system compromise, when someone has access to a box, does that individual have access to a shell on the system, i.e. the person is logging into the system using telnet or SSH to remotely access the box?? How does this individual/ hacker access the system. ... (2 Replies)
Discussion started by: skotapal
2 Replies
3. UNIX for Dummies Questions & Answers
I have a website but I do not for the life of me know how to upload using unix based command lines. Can someone send me a good site that has these commands. That and I am curious to know more about command line based interfacing. :D Curious Dummy (1 Reply)
Discussion started by: highway39
1 Replies
4. Linux
To correct most of the problems with this language, How do I remove the DOS and WORD stuff from it? These come from the fact that it was written on those with a Microsoft supplied platform at the writers request. (1 Reply)
Discussion started by: River Freight
1 Replies
5. UNIX for Advanced & Expert Users
Hi,
I am seeing a curious issue with 'ls' command.
If I open a telnet session of my Solaris box and give "ls".
The output is in 3 columns.
a b c
d e f
g h i
j k l
However, if I give the same command after a couple of hours in the same window, it goes to 6 columns according to the... (7 Replies)
Discussion started by: vibhor_agarwali
7 Replies
6. Shell Programming and Scripting
sorry, just simple question:
how can i do this in bash>
foreach i( 1 2 3 )
sed 's/Hello/Howdy/g' test$i > test$i.new
mv test$i.new test$i
end (6 Replies)
Discussion started by: kurosaki
6 Replies
7. Shell Programming and Scripting
I dont get something about sed
If i have a text file inside contain a:a:a:a:a
sed "s/"$title:$author:$price:$qtyAvailable:$qtySold"/"$Ntitle:$author:$price:$qtyAvailable:$qtySold"/"
This work!!
but
If i have a text file inside contain Tom Tom:La La:Di Di :Do Do :De DE
It cannot work... (2 Replies)
Discussion started by: GQiang
2 Replies
8. Shell Programming and Scripting
Hi,
I have been thinking about a few things that I have no idea of how to do with a scripting language (awk/sed I know to make proper use of just these 2).
1. Is there a way to have persistent variables? Say a variable that will be held in memory, and which can be accessed by subsequent... (7 Replies)
Discussion started by: jamie_123
7 Replies
LEARN ABOUT SUSE
ssetmask
SGETMASK(2) Linux Programmer's Manual SGETMASK(2)
NAME
sgetmask, ssetmask - manipulation of signal mask (obsolete)
SYNOPSIS
long sgetmask(void);
long ssetmask(long newmask);
DESCRIPTION
These system calls are obsolete. Do not use them; use sigprocmask(2) instead.
sgetmask() returns the signal mask of the calling process.
ssetmask() sets the signal mask of the calling process to the value given in newmask. The previous signal mask is returned.
The signal masks dealt with by these two system calls are plain bit masks (unlike the sigset_t used by sigprocmask(2)); use sigmask(3) to
create and inspect these masks.
RETURN VALUE
sgetmask() always successfully returns the signal mask. ssetmask() always succeeds, and returns the previous signal mask.
ERRORS
These system calls always succeed.
CONFORMING TO
These system calls are Linux-specific.
NOTES
Glibc does not provide wrappers for these system calls; use syscall(2).
These system calls are unaware of signal numbers greater than 31 (i.e., real-time signals).
It is not possible to block SIGSTOP or SIGKILL.
SEE ALSO
sigprocmask(2), signal(7)
COLOPHON
This page is part of release 3.25 of the Linux man-pages project. A description of the project, and information about reporting bugs, can
be found at http://www.kernel.org/doc/man-pages/.
Linux 2007-07-05 SGETMASK(2)