05-06-2011
sounds like you need to call your ISP to verify.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I've configured my TCP/IP to have the right protocols to access the internet such as TPC/IP, subnet mask, gateway and dns server but still Im not able to ping anything to the internet. Anybody who has some few good words for me? I need help. Thanks. (2 Replies)
Discussion started by: nseal101
2 Replies
2. UNIX for Dummies Questions & Answers
Hi everybody, I'd like create a connection (by modem) for my unix workstation. I just have the RS232 port and my modem, no lan connection, and I want to surf the net. How can I setup it?
Thanks in advance,
Mauro (1 Reply)
Discussion started by: Mauro
1 Replies
3. SCO
My SCO box has lost connection to the internet. It sites behind a fire wall and is connected to a local network. What should I check for. (2 Replies)
Discussion started by: fruiz
2 Replies
4. Solaris
Hi Friends,:b:
This is venkatesh, i have Intel Dual core PC and installed Solaris 10. I have a problem that i cannot access internet in my PC i don't know either the drivers installed or not. I manually assign ip 192.168.1.7 and if i ping to this it is alive and if i ping for 192.168.1.1 for the... (4 Replies)
Discussion started by: 1409.venkatesh
4 Replies
5. Solaris
hi experts
i have a sun Enterprise 220 R server with solaris 10 and patches , i configured network card with ip addresses that have access to Internet but i can't be connected :confused:
for same informations :
root@E220R # ifconfig -a
lo0:... (5 Replies)
Discussion started by: lid-j-one
5 Replies
6. UNIX for Dummies Questions & Answers
Hi everybody.
I've setup SunSolaris 10 on VirtualBox, but when I start Sun, I can connect to the Internet, when I open terminal and type command for list device ethernet:
#ifconfig -a
just only see loopback lo0
Can help me solve this problem?
Thank you very much,
ken (0 Replies)
Discussion started by: kenjingo
0 Replies
7. AIX
We have gotten an application that will read and display logs in a report format. The application need a user name and password to access the AIX servers where the logs reside. My problem is the logs are in a few different file systems on the server. Is there any way to lock the user to only the... (1 Reply)
Discussion started by: daveisme
1 Replies
8. UNIX and Linux Applications
I have nagios contacts set up, and these successfully limit access to view hosts and services in the nagios web UI.
But pnp4nagios gives access to all graphs (by editing the hostname and service name in the URL) - it does not respect the nagios-defined access controls. (0 Replies)
Discussion started by: ahmad.zuhd
0 Replies
9. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
So my problem is: 4990 of 5000 users should be able to access a file. How can this be accomplished.
2.... (1 Reply)
Discussion started by: protiss
1 Replies
10. Cybersecurity
can we use semantec or any kind of software in ubuntu/linux to limit access of a user to edit a specific file?
example:::
a. will not play media player or use usb.
we will edit blacklist.conf to do this. however user should still be able to do apt-get install, shutdown, edit other files etc.... (1 Reply)
Discussion started by: lhareigh890
1 Replies
LEARN ABOUT DEBIAN
rplay.hosts
RPLAY.HOSTS(5) File Formats Manual RPLAY.HOSTS(5)
NAME
rplay.hosts - rplay host authentication database
SYNOPSIS
/usr/local/etc/rplay.hosts
DESCRIPTION
The rplay.hosts file contains a list of hosts and access permissions which rplayd uses to validate incoming connections. Each line is of
the form:
hostname[:permission]
where
hostname is the name of a remote host or a host's IP address. Wildcards can be used within IP addresses to match multiple hosts.
The wildcard character is "*".
permission is an optional field containing any combination of the following characters:
r the host can read sounds.
w the host can write sounds.
x the host can play, stop, pause, and continue sounds. This is normally called execute permission.
m the host can monitor the audio stream written by rplayd to the audio device.
"rx" permissions are used when no permissions are specified.
EXAMPLE
#
# All hosts have read access:
#
*:r
#
# Trusted hosts:
#
nice-guy.sdsu.edu:rwx
friend.sdsu.edu:rwx
amigo.sdsu.edu:rwx
130.191.224.224:rwx
#
# Hosts which can read and execute:
#
foo.bar.com:rx
130.190.*:rx
146.244.234.*:rx
using.default.perms.edu
#
# Hosts which can monitor the audio stream
#
nsa.sdsu.edu:m
FILES
/usr/local/etc/rplay.hosts
SEE ALSO
rplayd(1)
BUGS
The permissions for an "*" entry apply to all matching hosts. The order of this file does not matter. Specific hosts can have access dis-
abled with entries like:
bad.guy.edu:
however, any matching "*" entries will still apply.
12/21/97 RPLAY.HOSTS(5)