06-20-2011
I don't know why logging in was slow after renaming the /etc/project file. As for the purpose of project concept - it is needed for the resource control on a server where multiple applications share limited resources. It is to prevent situation in which one very "hungry" application takes away all the CPU time or memory or other resources present on the server, making it impossible for other applications to run properly.
This User Gave Thanks to bartus11 For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi,
This is the first time I work in a big C project. All source code files are located in say directory /source/pp and all header files are in /include/pp. I've created a link to both of these directories from my home dir, say /home/ss. So in the /home/ss dir I have the /source/pp and /include/pp... (1 Reply)
Discussion started by: bruins2005
1 Replies
2. UNIX for Dummies Questions & Answers
I need to do a project that is suppose to read a file and it is suppose to display the number of the line plus whatever the file is reading indented by a tab:
example file:
"This is
the test
file."
expected output:
1 "This is
2 the test
3 file."
I am having two... (1 Reply)
Discussion started by: lesgoodfella
1 Replies
3. Solaris
We have a system running ssh. When a user logs in, they do not get the project they are assigned to (they run under "system"). I verify the project using the command "ps -e -o user,pid,ppid,args,project". If you do a "su - username", the user does get the project they are assigned to (and all... (2 Replies)
Discussion started by: kurgan
2 Replies
4. Homework & Coursework Questions
hai guys,
I'am a newbie to this forum and to unix as well...as a part of our syllabus i got a project in Unix which i have to do in 4 days.Project is kinda File locking i will give the project specs...guys please help me..
Established client-server architecture using socket... (1 Reply)
Discussion started by: rosemolr
1 Replies
5. UNIX for Advanced & Expert Users
I would be taking my masters degree project next year. So I am now in the process of thinking something that could help me get more in depth knowledge and will be a useful one in practice.
I have thought about creating shared file system for clustered environments (like GPFS,GFS).
I have... (4 Replies)
Discussion started by: kumaran_5555
4 Replies
6. Shell Programming and Scripting
Hi,
I have the following gcov compilation flags in all the QT source code project (*.pro) files.
CONFIG(gcov) {
LIBS += -lgcov
QMAKE_CXXFLAGS += -fprofile-arcs -ftest-coverage
}
Now, I want to remove these flags off my files. Please help me with a script to... (1 Reply)
Discussion started by: royalibrahim
1 Replies
7. News, Links, Events and Announcements
A new project was posted on your project board.
Project title: Bash Shell Tutoring
Estimated Budget:
$50/hr
Start date:
Immediately
Required skills:
Linux, Bash, Shell, UNIX
I work as a datawarehouse designer and developer.
Although I usually stick to the role of an analyst,... (0 Replies)
Discussion started by: Neo
0 Replies
8. Shell Programming and Scripting
Hi guys,
I am currently working as a system administration engineer, administering telecom applications on linux/unix platforms.
I want to learn new things and improve the ones that i have and for this i though to really work on some project or something but i lack of ideas.
I want to be... (2 Replies)
Discussion started by: capitanui
2 Replies
9. Shell Programming and Scripting
I have a project tree like that.
after running find command with the -no -empty option, i am able to have a list of non empty directory
DO_MY_SEARCH="find . -type d -not -empty -print0"
MY_EXCLUDE_DIR1=" -e NOT_IN_USE -e RTMAP -e NOT_USEFULL "
echo " " > $MY_TEMP_RESULT_1
while... (2 Replies)
Discussion started by: jcdole
2 Replies
LEARN ABOUT PHP
securetty
SECURETTY(5) Linux Programmer's Manual SECURETTY(5)
NAME
securetty - file which lists terminals from which root can log in
DESCRIPTION
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmis-
sion of certain authentication tokens.
It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the
shadow suite.
On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are
accepted.
FILES
/etc/securetty
SEE ALSO
login(1), login.defs(5), pam_securetty(8)
COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the
latest version of this page, can be found at https://www.kernel.org/doc/man-pages/.
Linux 2015-03-29 SECURETTY(5)